Cyber Security Threats Quiz

Cyber Security Threats Quiz

9th Grade

15 Qs

quiz-placeholder

Similar activities

Cell Phone Vocabulary

Cell Phone Vocabulary

9th - 12th Grade

12 Qs

Sprawdź się

Sprawdź się

4th - 12th Grade

10 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

Licencje i prawa autorskie

Licencje i prawa autorskie

KG - University

13 Qs

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

HTML

HTML

8th - 12th Grade

15 Qs

ICT - Networks and communication

ICT - Networks and communication

9th Grade

11 Qs

Cyber Security Threats Quiz

Cyber Security Threats Quiz

Assessment

Quiz

Computers

9th Grade

Practice Problem

Hard

Created by

Sophia Shen

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the aim of a brute-force attack?

To intercept data communications

To slow down networks

To encrypt data

To try all possible passwords until the correct one is found

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware replicates itself in order to spread to other computers?

Virus

Worm

Trojan horse

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the motivation for a ransomware attack?

To display large numbers of adverts

To find information about users

To receive a ransom (money)

To slow down networks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of spyware?

To replicate itself in other programs

To display large numbers of adverts

To find information about users

To encrypt the hard drive

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of adware?

To intercept data communications

To display large numbers of adverts

To find information about users

To slow down networks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for obtaining data, without permission, passing through a network?

Brute-force attack

Pharming

Data interception

Hacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main technique used in a phishing attack?

Obtaining confidential information by asking for it

Trying all possible passwords until the correct one is found

Sending emails pretending to be from a bank or website

Flooding a server with pointless requests

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?