Grade 7 Units 2.2 & 2.3 Quiz

Grade 7 Units 2.2 & 2.3 Quiz

7th Grade

8 Qs

quiz-placeholder

Similar activities

Identifica el tipo de ataque

Identifica el tipo de ataque

5th Grade - University

13 Qs

Online Scams and Schemes

Online Scams and Schemes

7th Grade

11 Qs

DF module 1

DF module 1

4th - 8th Grade

8 Qs

Y7A Week 26 Review Quiz Be Safe Online Week 25

Y7A Week 26 Review Quiz Be Safe Online Week 25

7th Grade

10 Qs

Malware

Malware

7th Grade - University

11 Qs

Internet Safety

Internet Safety

6th - 10th Grade

10 Qs

Online Scams and Schemes

Online Scams and Schemes

7th Grade

11 Qs

Quiz 3: Internet safety, cyber security and encryption

Quiz 3: Internet safety, cyber security and encryption

7th - 8th Grade

13 Qs

Grade 7 Units 2.2 & 2.3 Quiz

Grade 7 Units 2.2 & 2.3 Quiz

Assessment

Quiz

Computers

7th Grade

Medium

Created by

Yousef Ahmad

Used 3+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A cybercrime method that works/happens by stealing a person's personal information to create a stolen/fake identity, is know as ..........................

malware attack
phishing
password cracking
identity theft

2.

FILL IN THE BLANK QUESTION

1 min • 2 pts

An Indian call center that pretends to be an I.T. support from Microsoft to steal money from people. This is an example of ............................

3.

MULTIPLE SELECT QUESTION

1 min • 2 pts

........................ is a type of malware

Trojen

Spyware
Adware
Ransomware

4.

FILL IN THE BLANK QUESTION

1 min • 2 pts

......................... is a type of crime involving a computer or a computer network.

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

The most common/often way for criminal to spread malware is ...............................

Eating Fast Food

IPhone SUCKS

phishing emails or malicious attachments

Playing PS5

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

.................................. is used to protect our computer from viruses and other types of malware

7.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A fingerprint of a malware, is known as ..................................

virus
encryption
firewall
signature

8.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A file placed in quarantine means that .......................................

It has been isolated and restricted to prevent the spread of malware or viruses.

It has been moved to a different location.

It was created by Apple / Iphone SUCKS

Apple and Iphone supports Isreal