
Quiz 1 - Online Safety, Security, Ethics and Etiquette
Authored by wendyle araojo
Computers
12th Grade
Used 46+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jade is using a technique that tries to take information from the user. She commonly takes things like credit cards, usernames, passwords, and home addresses using a fake website. What type of threat is depicted in the scenario?
Phishing
Adware
Virus
Trojan
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Norma received an unwanted email that contains advertisements. What type of internet threat is depicted in the scenario?
Phishing
Trojan
Spam
Virus
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing.
Phishing
Virus
Malware
Spyware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jaryl is having a problem because his files were corrupted. He discovered that most of his folders were replicated.
Virus
Ransomware
Spyware
Worm
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maria was asked to pay a certain amount of money for him to retrieve his files. Maria might be a victim of ______.
Malware
Spyware
Ransomware
Spam
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The network servers of RHS stopped to respond and it was found out that much of the systems' memory was consumed by the malicious software. What kind of malware is this?
Worm
Trojan
Adware
Virus
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This program can record all you enter on your keyboard.
Virus
Spyware
Trojan
Keylogger
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?