Lesson 5 - Internet Threats

Lesson 5 - Internet Threats

University

15 Qs

quiz-placeholder

Similar activities

Week 4

Week 4

University

15 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Software Engineering :TEST 2

Software Engineering :TEST 2

University

10 Qs

Redes I- Componentes y tipos de redes

Redes I- Componentes y tipos de redes

University

20 Qs

ADVACOMT-Quiz No.1 (final term)

ADVACOMT-Quiz No.1 (final term)

University

15 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

Logika & Pemrograman (ID)

Logika & Pemrograman (ID)

10th Grade - Professional Development

20 Qs

2.4 - 2.6

2.4 - 2.6

University

15 Qs

Lesson 5 - Internet Threats

Lesson 5 - Internet Threats

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Kineth Chi Librinca

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the term used to describe actions taken by someone to gain unauthorized access to a computer?

Hacking

Phishing

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the common type of online fraud that redirects users to a malicious website by spoofing the legitimate URL?

Pharming

Trojan Horses

Malware

Spyware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of malware restricts access to a computer or files and demands payment for removal of the restriction?

Ransomware

Worms

Phishing

Spyware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of spam in the context of cybersecurity?

Delete files and hack other computers

Encrypt files on the system's hard drive

Collect personal information without consent

Annoy users with unwanted junk mail

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the term for a malicious program disguised as legitimate software that can delete files, log keystrokes, and watch through webcams?

Trojan Horses

Virus

Spyware

Worms

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main characteristic of worms as compared to viruses?

They provide criminals with access to the computer

They live in computer memory and propagate independently

They attach themselves to files or programs

They spread to everyone in the contact list

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of Wi-Fi eavesdropping in cyber attacks?

Steal personal information including logins and passwords

Spread to everyone in the contact list

Access the computer with the right equipment

Delete files and hack other computers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?