Search Header Logo

WebXam Cram 1.23.23

Authored by Susan Grasso

Specialty

12th Grade

20 Questions

Used 1+ times

WebXam Cram 1.23.23
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of threat involves an individual with authorized access to a computer system using that access to harm the system or steal sensitive information?

A) Insider threat
B) Virus
C) Worm
D) Spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware disguises itself as a legitimate program in order to gain access to a computer system?

A) Virus
B) Worm
C) Spyware
D) Ransomware

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which type of cyber attack involves an attacker using social engineering techniques to trick a victim into giving away sensitive information or access to a computer system?

A) Spoofing
B) Hacking
C) Social engineering
D) Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyber attack involves an attacker sending an email or message to a victim pretending to be a legitimate source, in order to trick the victim into providing sensitive information or installing malware on their computer?

A) Spoofing
B) Hacking
C) Social engineering
D) Phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyber attack involves an attacker altering the configuration of a computer system or network in order to gain unauthorized access or control?

A) Spoofing
B) Hacking
C) Social engineering
D) Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware encrypts files on a victim's computer, making them inaccessible until a ransom is paid to the attacker?

A) Virus
B) Worm
C) Spyware
D) Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyber attack involves an attacker using a fake website or email address to trick a victim into providing sensitive information or login credentials?

A) Spoofing
B) Hacking
C) Social engineering
D) Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?