Lesson 5 - Internet Threats

Lesson 5 - Internet Threats

University

15 Qs

quiz-placeholder

Similar activities

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

University

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

 Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

University

13 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade - University

19 Qs

Safeguarding Your Data Online Quiz

Safeguarding Your Data Online Quiz

12th Grade - University

11 Qs

UTILITY PROGRAM

UTILITY PROGRAM

University

10 Qs

CSF Week 2

CSF Week 2

University

10 Qs

Chapter 3 (fundamentals of Security)

Chapter 3 (fundamentals of Security)

University

10 Qs

Lesson 5 - Internet Threats

Lesson 5 - Internet Threats

Assessment

Quiz

Computers

University

Medium

Created by

Kineth Chi Librinca

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the term used to describe actions taken by someone to gain unauthorized access to a computer?

Hacking

Phishing

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the common type of online fraud that redirects users to a malicious website by spoofing the legitimate URL?

Pharming

Trojan Horses

Malware

Spyware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of malware restricts access to a computer or files and demands payment for removal of the restriction?

Ransomware

Worms

Phishing

Spyware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of spam in the context of cybersecurity?

Delete files and hack other computers

Encrypt files on the system's hard drive

Collect personal information without consent

Annoy users with unwanted junk mail

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the term for a malicious program disguised as legitimate software that can delete files, log keystrokes, and watch through webcams?

Trojan Horses

Virus

Spyware

Worms

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main characteristic of worms as compared to viruses?

They provide criminals with access to the computer

They live in computer memory and propagate independently

They attach themselves to files or programs

They spread to everyone in the contact list

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of Wi-Fi eavesdropping in cyber attacks?

Steal personal information including logins and passwords

Spread to everyone in the contact list

Access the computer with the right equipment

Delete files and hack other computers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?