Chapter 3 Cybersecurity

Chapter 3 Cybersecurity

University

12 Qs

quiz-placeholder

Similar activities

Computer Architecture Unit 3

Computer Architecture Unit 3

University

15 Qs

Tin 8/1

Tin 8/1

KG - University

10 Qs

Assessment 08

Assessment 08

University

15 Qs

Prework Etapa 1 - Bogotá

Prework Etapa 1 - Bogotá

University

10 Qs

Jaringan Nirkabel - Pertemuan 3

Jaringan Nirkabel - Pertemuan 3

University

10 Qs

Gerência do Processador

Gerência do Processador

University

16 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Chapter 3 Cybersecurity

Chapter 3 Cybersecurity

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Ria Castillo

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

intimidation

Urgency

compassion

honesty

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

Cross-site scripting

buffer overflow

XML injection

SQL injection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

social engineering

phishing

vishing

Trojan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

adware

spyware

virus

phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

trackers

pop-ups

spyware

adware

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two ways to protect a computer from malware? (Choose two.)

Defragment the hard disk.

Use antivirus software.

Keep software up to date.

Empty the browser cache.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a rootkit modify?

Notepad

operating system

programs

Microsoft Word

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers