Cyber security

Cyber security

12th Grade

20 Qs

quiz-placeholder

Similar activities

kuis informatika perangkat lunak

kuis informatika perangkat lunak

10th - 12th Grade

20 Qs

2561-1-ระบบสื่อสารสำหรับเครือข่ายคอมพิวเตอร์

2561-1-ระบบสื่อสารสำหรับเครือข่ายคอมพิวเตอร์

12th Grade

20 Qs

Warstwa transportowa

Warstwa transportowa

12th Grade

17 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

quizz tkinter

quizz tkinter

11th Grade - University

20 Qs

Tin 12 hk1 p2

Tin 12 hk1 p2

12th Grade

20 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

20 Qs

TIN 12_BÀI 11

TIN 12_BÀI 11

12th Grade

20 Qs

Cyber security

Cyber security

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Ahmed Hane

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of spyware?


Keylogger

Vulnerability

Computer Worm

Packet Sniffer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of Trojan enables unauthorized remote access to a compromised system?


pcap

RAT

MaaS

pfSense

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:


Phishing

Privilege escalation

Backdoor access

  • Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The practice of using a telephone system to manipulate user into disclosing confidential information is known as:

Whaling

Spear phishing

Vishing

Pharming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 Which of the following terms is commonly used to describe an unsolicited advertising message?

Spyware

Adware

Malware

Spam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 Phishing scams targeting a specific group of people are referred to as:

Vishing

Spear phishing

Spoofing

Whaling

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?