
1.5.3 - Starter Tasks/Network Threats (Dg)
Authored by Mike Roberts
Computers
11th Grade
Used 105+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware will lock/encrypt files and will be returned if a fee is paid? (1 point)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware self-replicates and copies itself from computer to computer? (1 point)
Worm
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware is often disguised as legitimate software for users to download? (1 point)
4.
FILL IN THE BLANK QUESTION
1 min • 2 pts
Which social engineering technique refers to the act of obtaining personal or private information through direct observation? (2 points)
(a)
5.
FILL IN THE BLANK QUESTION
1 min • 2 pts
Which social engineering technique involves a criminal making up a scenario in order to extract sensitive information? (2 points)
(a)
6.
FILL IN THE BLANK QUESTION
1 min • 2 pts
Which social engineering technique is the act of an unwanted party going through the bin at a company whether it be inside or outside the building? (2 point)
(a)
7.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Which network protocol is used to send messages? (3 points)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?