Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

REVISION PA-IV

REVISION PA-IV

3rd Grade

15 Qs

Autoevaluación

Autoevaluación

1st - 3rd Grade

13 Qs

Pemrograman Web Pra PAS

Pemrograman Web Pra PAS

11th Grade

10 Qs

ICT Unit Test Topic : DBMS - Access

ICT Unit Test Topic : DBMS - Access

8th - 12th Grade

15 Qs

ICT TANJORE

ICT TANJORE

12th Grade

11 Qs

Javascript 2

Javascript 2

1st Grade

13 Qs

PROCESADOR DE TEXTOS

PROCESADOR DE TEXTOS

4th Grade

10 Qs

Tree and Planar Graph

Tree and Planar Graph

University

10 Qs

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

Assessment

Quiz

Computers

KG - University

Practice Problem

Easy

Created by

Marcus Phang

Used 60+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What occurs on a computer when data goes beyond the limits of a buffer?

a system exception

cross-site scripting

an SQL injection

a buffer overflow

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a rootkit modify?

programs

Microsoft Word

operating system

Use antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of virus

a type of worm

a type of logic bomb

a type of ransomware

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the name given to a program or program code that bypasses normal authentication?

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the meaning of the term logic bomb?

a malicious virus

a malicious worm

a malicious program that hides itself in a legitimate program

a malicious program that uses a trigger to awaken the malicious code

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

adware

pop-ups

spyware

trackers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?