Cybersecurity Chapter 3

Cybersecurity Chapter 3

11th Grade

9 Qs

quiz-placeholder

Similar activities

Animasi 2D dan 3D Ulangan Harian BAB 1

Animasi 2D dan 3D Ulangan Harian BAB 1

11th Grade

10 Qs

Banco de Dados - Modelo Entidade Relacionamento (ER)

Banco de Dados - Modelo Entidade Relacionamento (ER)

11th Grade

10 Qs

Informática 1 - Examen del bloque 2

Informática 1 - Examen del bloque 2

1st Grade - University

10 Qs

Komputer Akuntansi

Komputer Akuntansi

11th Grade

10 Qs

BTEC DIT C3 LAA - Maintenance, Set up, Performance

BTEC DIT C3 LAA - Maintenance, Set up, Performance

10th - 11th Grade

10 Qs

CAPÍTULO 1 NETWORKING ESSENTIALS

CAPÍTULO 1 NETWORKING ESSENTIALS

1st - 12th Grade

11 Qs

Overview of IT

Overview of IT

6th Grade - University

8 Qs

ICT_LU3-Computer Software_League2

ICT_LU3-Computer Software_League2

10th - 12th Grade

10 Qs

Cybersecurity Chapter 3

Cybersecurity Chapter 3

Assessment

Quiz

Computers

11th Grade

Practice Problem

Hard

Created by

E Sheng Toh

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a rootkit modify?

Empty the browser cache.

Delete unused software.

Operating system.

Keep software up to date.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

SQL injection

Cross-site scripting

buffer overflow

XML injection

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two ways to protect a computer from malware? (Choose two.)

Delete unused software.

Use antivirus software.

Empty the browser cache.

Defragment the hard disk.

Keep software up to date.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

integrity

Impersonation

urgency

compassion

honesty

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type

this?

bluesnarfing

RF jamming

bluejacking

smishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

spear phishing

vishing

spyware

target phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

trackers

spyware

adware

pop-ups

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?