Cyber Security , Programming Language & Algorithm Test

Cyber Security , Programming Language & Algorithm Test

10th Grade

18 Qs

quiz-placeholder

Similar activities

J808 LO1 and LO2 planning project keywords / terms

J808 LO1 and LO2 planning project keywords / terms

9th - 11th Grade

15 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

Identidad Corporativa

Identidad Corporativa

10th Grade

15 Qs

ÔN TẬP CUỐI KỲ II TIN 8

ÔN TẬP CUỐI KỲ II TIN 8

8th - 11th Grade

17 Qs

¿QUÉ TANTO SABES?

¿QUÉ TANTO SABES?

1st - 12th Grade

14 Qs

Evaluación IV Parcial INTAE

Evaluación IV Parcial INTAE

10th Grade

14 Qs

Kelas 10-TIK2-Ms. Word

Kelas 10-TIK2-Ms. Word

10th Grade

15 Qs

Python Quiz For Starters

Python Quiz For Starters

3rd Grade - Professional Development

17 Qs

Cyber Security , Programming Language & Algorithm Test

Cyber Security , Programming Language & Algorithm Test

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Ashutosh Kumar

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is brute force in the context of cyber threats?

A) A physical attack on computer hardware.

B) When the criminal uses extensive trial and error methods to guess a password or other important information.

C) A method of protecting personal data by encrypting it.

D) Sending unsolicited emails to large numbers of people.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does identity theft involve?

A) Creating a fake identity to play pranks online.

B) A criminal uses someone else's identity or credentials to give them access to information.

C) Forgetting one's own passwords and using someone else's by mistake.

D) Accidentally sharing personal information on social media.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is phishing?

A) When a criminal sends an email that seems legitimate in an effort to get information from you.

B) When a criminal infects a computer with a virus.

C) When a criminal physically steals your computer or phone.

D) When a criminal uses brute force to guess your password.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is smishing?

A) When a criminal uses malware to infect your device.

B) When a criminal sends text messages to try and get personal information from people.

C) When a criminal calls you pretending to be from a legitimate company.

D) When a criminal uses social engineering to trick you in person.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of malware?

A) A text message asking for your personal details.

B) An email that looks legitimate but is actually a scam.

C) Viruses, spyware, and adware.

D) A program that helps to improve computer performance.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is keylogging?

A) A method for encrypting keystrokes to prevent detection.

B) A way of tracking every key and character that is typed on a keyboard.

C) A tool for measuring the speed of typing.

D) A software that helps in correcting typing errors.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does CSS stand for?

Computer Style Sheets

Creative Style System

Cascading Style Sheets

Colorful Style Sheets

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?