Chapter 1: Networks and the internet

Quiz
•
Computers
•
9th - 11th Grade
•
Hard
Marks Simon
Used 19+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Maryam joined as a business analyst in Alpha Delta IT solutions company. She needs to create a business email address that uses the company's domain name. Help Maryam by giving her five password suggestions for her new email account that cybercriminals find challenging to invade. Follow the tips given below for your suggestions:
1•Do not use your full name, address or phone number.
2•Do not use your email username
3•Do not use the same username and password combination as other accounts you may have.
4•Do not choose an odd username and then reuse it again.
5•Do not choose a password that can be guessed from your username.
m@Dxb13579
Fj43jtj345
123Maryam
Hello123
2.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Identify the malware used in the following cyberattacks.
1.Malware designed to track online activity and capture data
Ransomware
Virus
Adware
Spyware
3.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
Identify the malware used in the following cyberattacks
Software that automatically delivers advertisements
Ransomware
Adware
Virus
Spyware
4.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
Identify the malware used in the following cyberattacks
Malware that holds a computer system captive until payment is made to the attacker
Ransomware
spyware
Worms
Virus
5.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
Identify the malware used in the following cyberattacks
Malicious code that replicates itself independently by exploiting vulnerabilities in networks
Virus
Worms
Ransomware
Adware
6.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
Identify the malware used in the following cyberattacks
malware gains unauthorized access to a system by bypassing the normal authentication procedures.
Backdoor
Ransomware
Virus
Worm
7.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
Identify the malware used in the following cyberattacks.
malware that is designed to modify the operating system and give attackers access to remote resources
Backdoor
Worm
Ransomware
Rootkit
Similar Resources on Wayground
11 questions
Safety and Security in Business Quiz

Quiz
•
9th Grade
10 questions
รูปแบบภัยคุกคามทางไซเบอร์

Quiz
•
9th - 12th Grade
10 questions
Cyber Youth Camp - Pop Quiz

Quiz
•
9th - 12th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
10 questions
BTEC cyber security

Quiz
•
9th - 12th Grade
10 questions
Internet threats

Quiz
•
11th Grade
10 questions
Quiz 2 for 3rd Grading (TLE-ICT-CSS 10)

Quiz
•
10th Grade
10 questions
การโจมตีทางไซเบอร์ (Cyber Attack)

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
1.2 OSI & TCP IP Models Quiz

Quiz
•
10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
30 questions
Introduction to Computers

Quiz
•
8th - 9th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade