SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS

SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS

University

16 Qs

quiz-placeholder

Similar activities

Online Security_ETech

Online Security_ETech

11th Grade - University

14 Qs

BCS Network Security Test 4

BCS Network Security Test 4

University

18 Qs

Seguridad Informática

Seguridad Informática

University

20 Qs

แบบทดสอบพลเมืองดิจิทัล

แบบทดสอบพลเมืองดิจิทัล

12th Grade - University

15 Qs

Seguretat Digital i Privacitat

Seguretat Digital i Privacitat

12th Grade - University

21 Qs

SECURITY AWARENS

SECURITY AWARENS

University - Professional Development

13 Qs

Security Awareness Quiz

Security Awareness Quiz

University

15 Qs

Malware/ IOC

Malware/ IOC

10th Grade - Professional Development

20 Qs

SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS

SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS

Assessment

Quiz

Instructional Technology

University

Easy

Created by

joseph cortez

Used 7+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a self-replicating malware program that can spread across networks and systems without user intervention, often causing harm by consuming resources or carrying out malicious actions.

Trojan Horse

Worm

DDos

Rootkit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the use of deliberate and large-scale cyberattacks, often by politically motivated individuals or groups, to create fear, disrupt critical infrastructure, or cause harm to a nation or its population through digital means.

Smishing

Email Spam

Vishing

Cyberterrorism

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Vishing

Phishing

Rootkit

Email Spam

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

is a type of malware that disguises itself as a legitimate program or file to deceive users and gain unauthorized access to their systems, often with malicious intent.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

malware strain that typically infects a victim's computer through deceptive email attachments or malicious downloads, and it is designed to steal sensitive information, such as login credentials and financial data, by recording keystrokes and capturing screen images.

Zues

Zeus

sbot

Poseidon

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a social engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information, or sending money to cybercriminals.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a networking device that connects multiple networks together and forwards data packets from one network to another

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?