Cyber Security , Programming Language & Algorithm Test

Cyber Security , Programming Language & Algorithm Test

10th Grade

18 Qs

quiz-placeholder

Similar activities

AI

AI

10th - 12th Grade

14 Qs

GD2 - C++ 1.15 Quiz on Algorithms, Flowcharts & Pseudocode

GD2 - C++ 1.15 Quiz on Algorithms, Flowcharts & Pseudocode

9th - 12th Grade

20 Qs

Computer Science Pre-Test

Computer Science Pre-Test

9th - 12th Grade

20 Qs

Code org 1

Code org 1

5th - 12th Grade

21 Qs

Time machine week 4

Time machine week 4

9th - 12th Grade

15 Qs

CSF 1.8 Assessment Review - Algorithms

CSF 1.8 Assessment Review - Algorithms

9th - 12th Grade

17 Qs

CS Edexcel 1.2a Writing Algorithms

CS Edexcel 1.2a Writing Algorithms

9th - 10th Grade

13 Qs

CompTIA Programming Languages

CompTIA Programming Languages

8th - 11th Grade

19 Qs

Cyber Security , Programming Language & Algorithm Test

Cyber Security , Programming Language & Algorithm Test

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Ashutosh Kumar

Used 3+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is brute force in the context of cyber threats?

A) A physical attack on computer hardware.

B) When the criminal uses extensive trial and error methods to guess a password or other important information.

C) A method of protecting personal data by encrypting it.

D) Sending unsolicited emails to large numbers of people.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does identity theft involve?

A) Creating a fake identity to play pranks online.

B) A criminal uses someone else's identity or credentials to give them access to information.

C) Forgetting one's own passwords and using someone else's by mistake.

D) Accidentally sharing personal information on social media.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is phishing?

A) When a criminal sends an email that seems legitimate in an effort to get information from you.

B) When a criminal infects a computer with a virus.

C) When a criminal physically steals your computer or phone.

D) When a criminal uses brute force to guess your password.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is smishing?

A) When a criminal uses malware to infect your device.

B) When a criminal sends text messages to try and get personal information from people.

C) When a criminal calls you pretending to be from a legitimate company.

D) When a criminal uses social engineering to trick you in person.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of malware?

A) A text message asking for your personal details.

B) An email that looks legitimate but is actually a scam.

C) Viruses, spyware, and adware.

D) A program that helps to improve computer performance.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is keylogging?

A) A method for encrypting keystrokes to prevent detection.

B) A way of tracking every key and character that is typed on a keyboard.

C) A tool for measuring the speed of typing.

D) A software that helps in correcting typing errors.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does CSS stand for?

Computer Style Sheets

Creative Style System

Cascading Style Sheets

Colorful Style Sheets

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?