Y11 Network Threats Homework

Y11 Network Threats Homework

12th Grade

30 Qs

quiz-placeholder

Similar activities

CompTIA A+  220-1102 Practice Test 3+4 By Mr.B

CompTIA A+ 220-1102 Practice Test 3+4 By Mr.B

12th Grade

36 Qs

AP CSP 9-30 - 2.3 - MONDAY

AP CSP 9-30 - 2.3 - MONDAY

9th - 12th Grade

34 Qs

Topic 2.3 Classification of Network

Topic 2.3 Classification of Network

12th Grade

34 Qs

Certification Assessment

Certification Assessment

10th - 12th Grade

30 Qs

Wide Area Networks (WAN)

Wide Area Networks (WAN)

9th - 12th Grade

36 Qs

Mid-Term Online Quiz

Mid-Term Online Quiz

11th - 12th Grade

30 Qs

Administrasi Sistem Jaringan 2022/2023

Administrasi Sistem Jaringan 2022/2023

9th - 12th Grade

35 Qs

AP CSP Vocab Review Unit 2

AP CSP Vocab Review Unit 2

9th - 12th Grade

30 Qs

Y11 Network Threats Homework

Y11 Network Threats Homework

Assessment

Passage

Computers

12th Grade

Medium

Created by

Andrew Ward

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can copy itself and spread itself without human interaction.

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can appear harmless but is in fact malicious and can install a backdoor into your system?

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can encrypt your files and then require a payment to decrypt them.

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can copy itself and typically corrupts or deletes files. It is usually triggered by running an infected program.

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can record the keys that you type at the keyboard and sends them to a 3rd party?

Virus

Trojan

Worm

Ransomware

Spyware (Key Logger)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Phishing?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that redirects a user from a real URL to a website that looks real but is not.

Looking at someone entering their personal data into a system and copying what you see.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the best definition of Pharming?

Calling someone to create an invented situation that increases the chance they will share sensitive information with you.

Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.

A cyber attack that redirects a user from a real URL to a website that looks real but is not.

Looking at someone entering their personal data into a system and copying what you see.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?