Chapter 1: Networks and the internet

Chapter 1: Networks and the internet

9th - 11th Grade

7 Qs

quiz-placeholder

Similar activities

Types of malware

Types of malware

10th Grade

10 Qs

Malware Knowledge Quiz

Malware Knowledge Quiz

9th - 12th Grade

12 Qs

1.5.4 - Starter Task/Cyber Resilience

1.5.4 - Starter Task/Cyber Resilience

11th Grade

12 Qs

Nice Computer Quiz

Nice Computer Quiz

7th - 12th Grade

10 Qs

Tipos de malware

Tipos de malware

9th - 10th Grade

8 Qs

2.2 Antivirus

2.2 Antivirus

9th - 10th Grade

10 Qs

Internet Security

Internet Security

11th - 12th Grade

10 Qs

AMENAZAS EN LA RED

AMENAZAS EN LA RED

11th Grade

7 Qs

Chapter 1: Networks and the internet

Chapter 1: Networks and the internet

Assessment

Quiz

Computers

9th - 11th Grade

Hard

Created by

Marks Simon

Used 19+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Media Image

Maryam joined as a business analyst in Alpha Delta IT solutions company. She needs to create a business email address that uses the company's domain name. Help Maryam by giving her five password suggestions for her new email account that cybercriminals find challenging to invade. Follow the tips given below for your suggestions:

1•Do not use your full name, address or phone number.

2•Do not use your email username

3•Do not use the same username and password combination as other accounts you may have.

4•Do not choose an odd username and then reuse it again.

5•Do not choose a password that can be guessed from your username.

m@Dxb13579

Fj43jtj345

123Maryam

Hello123

2.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Media Image

Identify the malware used in the following cyberattacks.

1.Malware designed to track online activity and capture data

Ransomware

Virus

Adware

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

Identify the malware used in the following cyberattacks

Software that automatically delivers advertisements

Ransomware

Adware

Virus

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

 

Identify the malware used in the following cyberattacks

Malware that holds a computer system captive until payment is made to the attacker

Ransomware

spyware

Worms

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

Identify the malware used in the following cyberattacks

Malicious code that replicates itself independently by exploiting vulnerabilities in networks

Virus

Worms

Ransomware

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

Identify the malware used in the following cyberattacks

malware gains unauthorized access to a system by bypassing the normal authentication procedures.

Backdoor

Ransomware

Virus

Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

Identify the malware used in the following cyberattacks.

malware that is designed to modify the operating system and give attackers access to remote resources

Backdoor

Worm

Ransomware

Rootkit