Cyber Security , Programming Language & Algorithm Test

Cyber Security , Programming Language & Algorithm Test

10th Grade

18 Qs

quiz-placeholder

Similar activities

8525 AQA GCSE  3.1.1 Pseudo-code

8525 AQA GCSE 3.1.1 Pseudo-code

10th - 11th Grade

14 Qs

UNIT 1.2 MEMORY

UNIT 1.2 MEMORY

10th Grade

19 Qs

BÀI 14- THUẬT TOÁN TÌM KIẾM TUẦN TỰ

BÀI 14- THUẬT TOÁN TÌM KIẾM TUẦN TỰ

6th Grade - University

14 Qs

B Words GCSE Computer Science

B Words GCSE Computer Science

1st - 10th Grade

15 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

computer Lab Manners

computer Lab Manners

5th - 10th Grade

19 Qs

COMPRAR UNA LAPTOP

COMPRAR UNA LAPTOP

10th Grade

20 Qs

tik kelas 7

tik kelas 7

1st Grade - University

15 Qs

Cyber Security , Programming Language & Algorithm Test

Cyber Security , Programming Language & Algorithm Test

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Ashutosh Kumar

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is brute force in the context of cyber threats?

A) A physical attack on computer hardware.

B) When the criminal uses extensive trial and error methods to guess a password or other important information.

C) A method of protecting personal data by encrypting it.

D) Sending unsolicited emails to large numbers of people.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does identity theft involve?

A) Creating a fake identity to play pranks online.

B) A criminal uses someone else's identity or credentials to give them access to information.

C) Forgetting one's own passwords and using someone else's by mistake.

D) Accidentally sharing personal information on social media.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is phishing?

A) When a criminal sends an email that seems legitimate in an effort to get information from you.

B) When a criminal infects a computer with a virus.

C) When a criminal physically steals your computer or phone.

D) When a criminal uses brute force to guess your password.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is smishing?

A) When a criminal uses malware to infect your device.

B) When a criminal sends text messages to try and get personal information from people.

C) When a criminal calls you pretending to be from a legitimate company.

D) When a criminal uses social engineering to trick you in person.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of malware?

A) A text message asking for your personal details.

B) An email that looks legitimate but is actually a scam.

C) Viruses, spyware, and adware.

D) A program that helps to improve computer performance.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is keylogging?

A) A method for encrypting keystrokes to prevent detection.

B) A way of tracking every key and character that is typed on a keyboard.

C) A tool for measuring the speed of typing.

D) A software that helps in correcting typing errors.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does CSS stand for?

Computer Style Sheets

Creative Style System

Cascading Style Sheets

Colorful Style Sheets

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?