Search Header Logo

Cyber threats

Authored by Taff Taff

Computers

11th Grade

Used 2+ times

Cyber threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

systems under hacker control that have been infected with malware. Attackers use these bots to carry out DDoS attacks. Large botnets can include millions of devices and can launch attacks at devastating scale.

Malware

Botnets

Trojan

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who are illegally attacks your accounts, device, and steal your information online.

Cyber Attackers

Hackers

Thief

Illegal Hackers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ can come in many shapes and sizes, but it all functions with the same basic concept: You must pay a ransom in order to gain access to your data. Oftentimes, attackers follow with a second ransom in order to keep stolen data from being sold online

Bait advertising

Malware

Ransomware

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Form of malware that hides on a device providing real-time information sharing to its host, enabling them to steal data like bank details and passwords.

Trojan

Spyware

Botnet

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _______ creates a backdoor in your system, allowing the attacker to gain control of your computer or access confidential information.

Trojan

Malvertisng

Malware

Spyware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?