
Cybersecurity
Authored by EUGENE SCHOECK
Computers, Other, Science
9th - 12th Grade
Used 70+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of changing plain text into ciphertext for the purpose of security or privacy?
Denial of Service
Encryption
Endpoint Protection Platform
Digital Signature
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
software that is designed to gain access to your computer with malicious intent. An umbrella term for all software that has malicious intent (viruses, worms, Trojans...)
malware
ransomware
adware
spyware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software that encrypts programs and data until a ransom is paid to remove it.
malware
adware
ransomware
spyware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
unwanted software that monitors and gathers information on a person and how they use their computer
adware
ransomware
Trojan
spyware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common sign of a phishing email?
The email contains poor spelling and grammar.
The email is from a government official.
The email is from a trusted source.
The email contains high-quality images.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is meant by the term 'white hat hacker'?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is meant by a 'black hat hacker'?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?