In Cybersecurity, a threat agent is...
Cybersecurty Concepts

Quiz
•
Computers
•
University
•
Medium
Clara Rivera
Used 3+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The entity that identifies a vulnerability and uses it to attack the victim.
A computer criminal.
An organization of houseplants that use their photosynthetic powers to infiltrate devices.
The realisation of a stated threat.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Cybersecurity, an exploit is....
A software tool developed to take advantage of a vulnerability.
A piece of software to to unethically take advantage of (a person, situation, etc), in the digital world.
A mystical spell cast by mischievous digital fairies to transform computers into tea-brewing robots.
The realization of a cyber threat.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Cybersecurity, countermeasures are...
Pieces of software used to launch cyber attacks.
Criminal actions or strategies from hackers.
Methods to detect and track hackers.
Techniques used to defend against attacks and to solve or compensate vulnerabilities.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Cybersecurity, phishing is...
A technique to acquire sensitive information (eg login credentials or credit card data), by pretending to be a trustworthy organization
The activity of catching phish, either for food or as a sport.
A technique to generate forge copies of sensitive information to trick hackers.
A technique inspired in ancient methods whereby cyber pirates cast virtual fishing rods into the vast internet sea.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Cybersecurity, ransomware is...
A cryptovirological malware for identity theft.
A digital poltergeist that sneaks into computers and encrypts files.
A wide range of malicious programs such as virus or trojans.
A pieve of software designed to keep the user from their data and hold it hostage for payment.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Cybersecurity, spyware is....
Software to obtain hidden information in any computer.
Digital secret agent squirrels that hide in computers wearing a tiny trench coat and sunglasses.
Programs introduced through downloads to monitor operation and collect information such as passwords, credit card numbers, etc.
Cutting-edge technology that helps you locate lost items by scanning your digital environment.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Cybersecurity, adware is...
A program designed to introduce digital advertising you will not forget.
A program designed to introduce unwanted, unsolicited advertising displays to a web browser.
A mischievous digital parrot that perches on your browser's toolbar, constantly interrupting your online adventures with absurd sales pitches.
A set of pixelated pom-poms accompanied by slogans like "Buy, Buy, Buy!"
Create a free account and access millions of resources
Similar Resources on Quizizz
13 questions
305 - DAY 5

Quiz
•
University
14 questions
Malware And Hackers

Quiz
•
KG - University
10 questions
Understanding Cybersecurity

Quiz
•
5th Grade - Professio...
10 questions
Week 10 - Cyber Attacks Quiz - Exercise 1

Quiz
•
University
10 questions
CyberCell360

Quiz
•
University
9 questions
Basic cyber security knowledge

Quiz
•
KG - University
11 questions
Data Security Quiz

Quiz
•
University
10 questions
INFOASSURANCE

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade