
Cybersecurity Fundamentals
Authored by TDX Facilitator
Education
Professional Development
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The presence of a weakness in a system, program, or network is referred to as a:
vulnerability
exploit
adware
malware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements is true about the trojans?
Trojans spread throughout the network without user intervention
Trojans conceal themselves by convincing users that it is a legitimate file.
Trojans encrypt user files and documents and demand payment to decrypt them.
Trojans display ads on web browser screens.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is NOT an example of a Social Engineering threat:
Spear Phishing
Vishing
Whaling
Denial of Service (DoS)
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the typical attributes of a spear phishing attack? (Choose two)
Focused & personalized
Uses email spoofing techniques
Large number of recipients (Mass spam)
Smaller number of recipients
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Phishing technique relies of phone audio interactions to conduct further social engineering?
Vishing
Smishing
Whaling
Spear Phishing
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are some ways to identify potential phishing emails: (Select all that apply)
Spelling & grammar mistakes
Suspicious links or attachments
Threatening language with demands
Unexpected request for personal information
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of cyber attack attempts to intercept data between sender(s) & recipients(s)?
Denial of Service
Man in the Middle
Ransomware
Brute Force
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Reading and Reflection
Quiz
•
Professional Development
15 questions
UN Headquarters NYC
Quiz
•
10th Grade - Professi...
16 questions
Spoken English Quiz For Beginners
Quiz
•
5th Grade - Professio...
15 questions
GRAMMAR B1:PREPOSITIONS AFTER ADJECTIVES&VERBS
Quiz
•
6th Grade - Professio...
16 questions
COVID-19
Quiz
•
Professional Development
20 questions
Diseminasi Bahasa Daerah
Quiz
•
Professional Development
15 questions
Digital Maketing Workshop
Quiz
•
Professional Development
15 questions
Round 2 - QUICK FIRE
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Education
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development