Cyber Lesson 4

Cyber Lesson 4

8th Grade

36 Qs

quiz-placeholder

Similar activities

OCR Cambridge National ICT LO3

OCR Cambridge National ICT LO3

KG - Professional Development

34 Qs

Computers and Peripherals

Computers and Peripherals

6th - 8th Grade

35 Qs

Technology Vocabulary Quiz #1 (List 1-4)

Technology Vocabulary Quiz #1 (List 1-4)

6th - 8th Grade

31 Qs

Technology Applications Terminology

Technology Applications Terminology

6th - 8th Grade

39 Qs

Would You Rather Questions

Would You Rather Questions

6th - 8th Grade

35 Qs

2.1 Input Devices ICT

2.1 Input Devices ICT

7th - 11th Grade

36 Qs

Coding

Coding

5th - 12th Grade

35 Qs

Cyber tools & security with CSS

Cyber tools & security with CSS

6th - 9th Grade

36 Qs

Cyber Lesson 4

Cyber Lesson 4

Assessment

Quiz

Instructional Technology

8th Grade

Medium

Created by

Kari J

Used 2+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Lori clicked on an attachment that she thought was from her manager. Later she found out it was a fake email. Without knowing, she did some work on network files. The next day Lori and team members had issues with their monitors. What type of malware was likely installed by the attachment?
Virus
Worm
Trojan
Ransomware

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Jeff bought a smartphone. The store told him to install phone updates as soon as they are released. This will help protect the phone from malware. Why?
Malware is software or code that can damage a device, online account or network.
Malware is software that will assign a copyright to every image on your device.
Malware will ensure that the cell towers treat your calls as a high priority.
Malware will ensure that data uploaded to the Internet or app is protected.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Mary received a text from stranger who said they were with her mother who was hurt in a car accident. The stranger wants to bring Mary’s mom home, but her mom doesn’t remember the house address. What type of social engineering tactic is this?
Pretexting
Pharming
Phishing
Baiting

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is malware dangerous?
It can install hidden applications that share your personal information without your permission.
It can track your personal preferences and passwords.
It can lock you out of your computer, until you pay a ransom fee.
It can keep you from accessing web sites you want to see.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why are computer viruses dangerous?
They can run programs that may harm your computer or allow hackers to access your computer.
They will try to sell you things you do not want.
They can invalidate your other software licences.
They will cause your browser to popup advertisements

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The network was attacked by a cybercriminal and no one can access their files until money is paid. What type of malware likely gained access to the network?
Ransomware
Worm
Adware
Spyware

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You receive an e-mail from a good friend. It tells you go look at a website where they found surf boards for sale. You know your friend is not interested in surfing.  What kind of common threat is this message?
Pharming
Virus
Malware
Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?