
Cyber Security: Malware, Vishing & Spear Phishing
Authored by Mike undefined
Other
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves impersonating a trusted sender to distribute malware?
Spear phishing
Adware
Virus spreading
Trojan horse
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the special form of malware that encrypts data for ransom called?
Worm
Adware
Ransomware
Spyware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is downloading and executing programs from the internet risky?
It uses up a lot of data
It provides a gateway for hackers
It can make your device outdated
It can slow down your computer
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why might hackers leave malware-infected USB devices around a company's premises?
To infect the company's network
To steal the devices back
To conduct a social experiment
For no specific reason
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What should you NOT do before activating a macro in an attached office file? (MULTIPLE CHOISE )
Consult your security department
Share it with colleagues
Delete the file
Download more files for verification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What email address is provided for sending the payment via PayPal?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What additional penalty is mentioned if the payment is late?
$800
$1,000
$900
$750
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?