Cybersecurity Chapter 3

Quiz
•
Computers
•
11th Grade
•
Hard

E Sheng Toh
Used 1+ times
FREE Resource
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a rootkit modify?
Empty the browser cache.
Delete unused software.
Operating system.
Keep software up to date.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?
SQL injection
Cross-site scripting
buffer overflow
XML injection
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two ways to protect a computer from malware? (Choose two.)
Delete unused software.
Use antivirus software.
Empty the browser cache.
Defragment the hard disk.
Keep software up to date.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)
integrity
Impersonation
urgency
compassion
honesty
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type
this?
bluesnarfing
RF jamming
bluejacking
smishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe an email that is targeting a specific person employed at a financial institution?
spear phishing
vishing
spyware
target phishing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name for the type of software that generates revenue by generating annoying pop-ups?
trackers
spyware
adware
pop-ups
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What occurs on a computer when data goes beyond the limits of a buffer?
an SQL injection
a system exception
cross-site scripting
a buffer overflow
9.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?
adware
virus
spyware
phishing
Similar Resources on Wayground
11 questions
COMPUETR AND NETWORK

Quiz
•
9th - 12th Grade
14 questions
Threat Prevention

Quiz
•
11th Grade
8 questions
Online Security Threats

Quiz
•
7th - 11th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
10 questions
BTEC DIT C3 LAB - External Threats

Quiz
•
10th - 11th Grade
11 questions
1.5.5 - Starter Task/Digital Footprint

Quiz
•
11th Grade
10 questions
BTEC cyber security

Quiz
•
9th - 12th Grade
10 questions
Found. of IT: Security Threats - A

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Computers
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
40 questions
LSHS Student Handbook Review: Pages 7-9

Quiz
•
11th Grade
20 questions
Scalars, Vectors & Graphs

Quiz
•
11th Grade
62 questions
Spanish Speaking Countries, Capitals, and Locations

Quiz
•
9th - 12th Grade
10 questions
Solving Equations Opener

Quiz
•
11th Grade
20 questions
First Day of School

Quiz
•
6th - 12th Grade
21 questions
Arithmetic Sequences

Quiz
•
9th - 12th Grade