Search Header Logo

ICT test by Michael

Authored by Pacilan, P

Computers

11th Grade

Used 6+ times

ICT test by Michael
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.( it's related to fish)

Media Image

Phishing

Cathing

Scamming

Answer explanation

It's named after how it is done

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious website that resembles a legitimate website, used to gather or Farm usernames and passwords.

Pharming

Agriculture

Farming

Gathering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of scam that uses internet to mislead the user in many ways attempting to take lead of them.

The purpose of this scam is to cheat the target of their personal property directly rather than private information through fabricated promises, confidence tricks and many more.

Phishing

Internet scam

Bribery

Hacking

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network of zombie computers that have been taken over by a "Robot" or "bot "that performs large- scale malicious acts for the creator of the botnet. Captcha technology is used to avoid this type of security threat.

Internet both

Internet Bots

Hacking

Trojan

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a "MaLicious softWare" disguised as real software often secretly installed, intended to transfer and gather private information, like passwords, without the user's permission.

Malware

Adware

Software

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A generic term for spyware and adware.

Malware

Incognito

Trojan

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An act performed by a knowledgeable computer user sometimes referred to as hacker that illegally browses or steal someone's information.

Stalking

Spoofing

Hacking

Online threats

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?