Search Header Logo

Intro to Cybersecurity

Authored by Jeanelle Mauricio

Computers

Professional Development

Intro to Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a malicious executable code that is attached to other executable files, often legitimate programs.

Spyware

Ransomware

Virus

Adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a method of infiltration used by malicious party to send a fraudulent email disguised as being from a legitimate or trusted source

Social Engineering

Brute-force attacks

Phishing

Spear Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is the protection of network system and data from unauthorized use or harm.

Information Security

Cybersecurity

Internet of Things

CISCO

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CIA means

Capable,

Internet,

Advance

Computer, Information, Accurate

Confidentiality, Integrity, Availability

Cost,

Integer,

Area

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a person who breaks into computers or networks to gain access.

Trespasser

Kidnapper

Cashier

Hacker

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

also called privacy, which means that data access is restricted to authorized personnel only.

Integrity

Confidentiality

Availability

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a malicious code that replicates itself by independently exploiting vulnerabilities in networks.

Trojan Horse

MITM

Scareware

Worm

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?