Search Header Logo

Cybersecurity - Device Security

Authored by Trever Wagner

Computers

9th - 12th Grade

Used 5+ times

Cybersecurity - Device Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a phishing attack?

A type of fishing that involves catching phish

A type of social media platform

A fraudulent message sent to trick the recipient into revealing sensitive information or clicking on a malicious link.

A type of virus that infects computers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of malware?

Spyware

Antivirus

Ransomware

Trojan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of malware protection software?

To detect, prevent and remove malicious software from a computer system.

To download more software onto the computer

To increase the speed of the computer

To improve the computer's graphics

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a strong password management practice?

Using the same password for multiple online accounts

Using a simple and easy-to-guess password

Sharing passwords with others

Using a unique and complex password for each online account

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Harper received an email from a stranger asking for her login details to a popular social media platform. The stranger claimed to be a customer service representative and said they needed the information to resolve an issue with her account. This is an example of what?

A type of marketing strategy used to promote products on social media platforms.

A technique used by hackers to physically break into buildings and steal information.

A form of psychological manipulation used by therapists to help individuals overcome social anxiety.

A method used by attackers to manipulate individuals into revealing sensitive information or performing actions that may compromise security.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evelyn received an email that appears to be from her bank, asking her to update her account details. This is most likely an example of which of the following?

Denial of Service

Malware

Pharming

Email spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to protect against malware?

Install as many software as possible

Click on suspicious links and download attachments from unknown sources

Never update your operating system or software

Use antivirus software and keep your operating system and software up to date.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?