Cybersecurity Chapter 3

Cybersecurity Chapter 3

11th Grade

9 Qs

quiz-placeholder

Similar activities

Kuis library JMF

Kuis library JMF

9th - 12th Grade

10 Qs

Numeracion y electricidad

Numeracion y electricidad

11th Grade

10 Qs

Powerpoint Quiz

Powerpoint Quiz

9th - 12th Grade

10 Qs

Sept 14 quiz

Sept 14 quiz

9th - 12th Grade

10 Qs

Computer Vocabulary 1

Computer Vocabulary 1

1st - 12th Grade

14 Qs

Chapter 1: Computer Basics Quiz

Chapter 1: Computer Basics Quiz

9th - 12th Grade

10 Qs

Internet 1

Internet 1

10th - 11th Grade

12 Qs

Parcial 1, Primera serie

Parcial 1, Primera serie

6th Grade - University

10 Qs

Cybersecurity Chapter 3

Cybersecurity Chapter 3

Assessment

Quiz

Computers

11th Grade

Practice Problem

Hard

Created by

E Sheng Toh

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a rootkit modify?

Empty the browser cache.

Delete unused software.

Operating system.

Keep software up to date.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

SQL injection

Cross-site scripting

buffer overflow

XML injection

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two ways to protect a computer from malware? (Choose two.)

Delete unused software.

Use antivirus software.

Empty the browser cache.

Defragment the hard disk.

Keep software up to date.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

integrity

Impersonation

urgency

compassion

honesty

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type

this?

bluesnarfing

RF jamming

bluejacking

smishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

spear phishing

vishing

spyware

target phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

trackers

spyware

adware

pop-ups

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?