Cyber Aware Week 2

Cyber Aware Week 2

University

10 Qs

quiz-placeholder

Similar activities

Cyber Security QUIZ

Cyber Security QUIZ

University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

15 Qs

ITE-13-Quiz01

ITE-13-Quiz01

University

10 Qs

Cybersecurity Quiz (NeoCyber Discord)

Cybersecurity Quiz (NeoCyber Discord)

9th Grade - University

12 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Digital Communication II

Digital Communication II

5th Grade - University

15 Qs

Cyber Aware Week 2

Cyber Aware Week 2

Assessment

Quiz

Computers

University

Easy

Created by

Alan Downes

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a type of malicious software designed to gain unauthorized access to a computer system?

Malware

Phishing

Social engineering

Encryption

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a distinguishing characteristic of a virus compared to other types of malware?

It spreads independently through networks

It encrypts files and demands payment for decryption

It requires user interaction to spread

It primarily targets mobile devices

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A worm differs from a virus in that it ...

Encrypts files on the infected system

Requires human intervention to spread

Spreads autonomously over networks

Masquerades as a legitimate software application

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Ransomware typically ...

Encrypts files and demands payment for decryption

Steals sensitive information and sells it on the black market

Deletes files and corrupts the operating system

Sends unsolicited emails containing malicious links or attachments

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a form of phishing that targets specific individuals or organizations, often using personalized information?

Smishing

Spear phishing

Ransomware

Botnet

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Social engineering relies on ...

Exploiting vulnerabilities in software code

Manipulating individuals into divulging confidential information

Encrypting sensitive data to prevent unauthorized access

Utilizing automated scripts to spread malware

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What term describes the unsolicited sending of large volumes of email, often containing advertisements or malicious content?

Spam

Bot

Encryption

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?