ICT test by Michael

ICT test by Michael

11th Grade

10 Qs

quiz-placeholder

Similar activities

The Internet

The Internet

6th Grade - Professional Development

14 Qs

Phishing scams /chams/

Phishing scams /chams/

KG - Professional Development

10 Qs

Internet security

Internet security

11th - 12th Grade

10 Qs

ONLINE SAFETY

ONLINE SAFETY

11th Grade

15 Qs

Cloud Computing

Cloud Computing

7th - 11th Grade

10 Qs

cybersecurity hackers

cybersecurity hackers

11th Grade

15 Qs

Computer Virus                          by: theNaishafantasy

Computer Virus by: theNaishafantasy

4th - 12th Grade

10 Qs

societal impacts class12

societal impacts class12

KG - 12th Grade

10 Qs

ICT test by Michael

ICT test by Michael

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Pacilan, P

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.( it's related to fish)

Media Image

Phishing

Cathing

Scamming

Answer explanation

It's named after how it is done

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious website that resembles a legitimate website, used to gather or Farm usernames and passwords.

Pharming

Agriculture

Farming

Gathering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of scam that uses internet to mislead the user in many ways attempting to take lead of them.

The purpose of this scam is to cheat the target of their personal property directly rather than private information through fabricated promises, confidence tricks and many more.

Phishing

Internet scam

Bribery

Hacking

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network of zombie computers that have been taken over by a "Robot" or "bot "that performs large- scale malicious acts for the creator of the botnet. Captcha technology is used to avoid this type of security threat.

Internet both

Internet Bots

Hacking

Trojan

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a "MaLicious softWare" disguised as real software often secretly installed, intended to transfer and gather private information, like passwords, without the user's permission.

Malware

Adware

Software

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A generic term for spyware and adware.

Malware

Incognito

Trojan

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An act performed by a knowledgeable computer user sometimes referred to as hacker that illegally browses or steal someone's information.

Stalking

Spoofing

Hacking

Online threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?