Digital Literacy Training

Digital Literacy Training

Professional Development

20 Qs

quiz-placeholder

Similar activities

Google Professional Architect 5 - 81 to 100

Google Professional Architect 5 - 81 to 100

Professional Development

20 Qs

E-content Development Program at Fatehabad  (Haryana) India

E-content Development Program at Fatehabad (Haryana) India

Professional Development

25 Qs

Google Professional Architect 10 - 181 to 197

Google Professional Architect 10 - 181 to 197

Professional Development

17 Qs

Grounding and Bonding quiz #1

Grounding and Bonding quiz #1

Professional Development

15 Qs

Global Coffee - Cybersecurity Essentials

Global Coffee - Cybersecurity Essentials

Professional Development

15 Qs

Identity Theft , Scams & Phishing

Identity Theft , Scams & Phishing

Professional Development

18 Qs

Konde technology quiz - Do you know your educational Apps?

Konde technology quiz - Do you know your educational Apps?

Professional Development

21 Qs

Security Awareness Vol.4

Security Awareness Vol.4

Professional Development

15 Qs

Digital Literacy Training

Digital Literacy Training

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

Ralph Sinsuat

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is the primary purpose of malware?

Enhance system performance

Provide additional features to software

Cause harm or steal information

Improve user experience

2.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

Which type of malware disguises itself as a legitimate program but carries a malicious payload?

Spyware

Trojan

Worm

Adware

3.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is a key characteristic of a computer virus?

Requires user interaction to spread

Spreads through email attachments

Replicates itself and attaches to other programs

Targets only specific file types

4.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What type of malware is designed to spread rapidly across a network, often exploiting security vulnerabilities?

Adware

Ransomware

Worm

Rootkit

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does the term "phishing" refer to in the context of hacking?

Exploiting software vulnerabilities

Manipulating computer hardware

Deceptive attempts to obtain sensitive information

Spreading malware through infected flash drives


6.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

What is the primary goal of ethical hacking?

Stealing sensitive information

Disrupting network communication

Identifying and fixing security vulnerabilities

Creating malicious software

7.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

What does the term "pharming" refer to in the context of cybersecurity?

Manipulating computer hardware

Deceptive attempts to obtain sensitive information

Redirecting website traffic to a fraudulent site

  1. d. Spreading malware through infected USB drivers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?