Etech Q3 module 2

Etech Q3 module 2

12th Grade

15 Qs

quiz-placeholder

Similar activities

Cybersecurity, Victor Magnusson

Cybersecurity, Victor Magnusson

1st Grade - Professional Development

10 Qs

Lesson 2 - Post Test

Lesson 2 - Post Test

12th Grade

10 Qs

Segurança

Segurança

9th - 12th Grade

12 Qs

Examen T.I.C. - 2ºBachiller

Examen T.I.C. - 2ºBachiller

12th Grade

18 Qs

Internet security

Internet security

11th - 12th Grade

10 Qs

Quiz on Internet and Cyber Security

Quiz on Internet and Cyber Security

12th Grade

14 Qs

INTRO TO ICT WEEK 1 FORMATIVE ASSESSMENT

INTRO TO ICT WEEK 1 FORMATIVE ASSESSMENT

11th - 12th Grade

15 Qs

ICT QUIZ BEE (DIFFICULT)

ICT QUIZ BEE (DIFFICULT)

7th - 12th Grade

10 Qs

Etech Q3 module 2

Etech Q3 module 2

Assessment

Quiz

Instructional Technology

12th Grade

Hard

Created by

ELMA DASIAN

Used 5+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It displays unwanted ads when a

user is surfing the internet.

malware
spyware
adware
phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a form of malicious software and internet fraud that misleads users into believing there

is a virus on their computer and convince them to pay for a fake malware removal tool.

Deceitware

Rogue security

software

Hoaxware
Fakeware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They present themselves as harmless computer programs so that hackers can penetrate your computer without being detected.

Firewall
Worm

Trojan

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It can monitor your keystrokes, read and delete your files, reformat your hard drive, and access your applications.

Firewall
Spyware
Trojan
Keylogger

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These are unwanted emails.

garbage
trash
junk
spam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They usually make their way on to a computer via a malicious email attachment or USB stick.

phishing
ransomware
trojan

worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They are often attached to files for download, shared via CDs, DVDs, and USB sticks, or loaded on to

computers by opening infected email attachments.

Pharmers

virus

Phishing

Netiquette

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?