Cyber threats

Cyber threats

11th Grade

5 Qs

quiz-placeholder

Similar activities

PCO Part 1

PCO Part 1

11th Grade

10 Qs

Pengenalan Software

Pengenalan Software

11th Grade

10 Qs

AMENAZAS Y ATAQUES COMUNES

AMENAZAS Y ATAQUES COMUNES

11th Grade

10 Qs

Biometrics-IGCSE ICT

Biometrics-IGCSE ICT

9th - 11th Grade

10 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

CSP Unit 10 Pre-Assessment - Cybersecurity

CSP Unit 10 Pre-Assessment - Cybersecurity

9th - 12th Grade

10 Qs

Internet Safety

Internet Safety

10th Grade - University

10 Qs

Computer Malware

Computer Malware

6th - 12th Grade

10 Qs

Cyber threats

Cyber threats

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Taff Taff

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

systems under hacker control that have been infected with malware. Attackers use these bots to carry out DDoS attacks. Large botnets can include millions of devices and can launch attacks at devastating scale.

Malware

Botnets

Trojan

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who are illegally attacks your accounts, device, and steal your information online.

Cyber Attackers

Hackers

Thief

Illegal Hackers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ can come in many shapes and sizes, but it all functions with the same basic concept: You must pay a ransom in order to gain access to your data. Oftentimes, attackers follow with a second ransom in order to keep stolen data from being sold online

Bait advertising

Malware

Ransomware

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Form of malware that hides on a device providing real-time information sharing to its host, enabling them to steal data like bank details and passwords.

Trojan

Spyware

Botnet

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _______ creates a backdoor in your system, allowing the attacker to gain control of your computer or access confidential information.

Trojan

Malvertisng

Malware

Spyware