Search Header Logo

Keylogging, Malware, Phishing

Authored by Allan Jr

Computers

12th Grade

Used 2+ times

Keylogging, Malware, Phishing
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your friend suspects their computer was compromised. What could be happening if their keystrokes are being recorded without their knowledge?

Their computer might be recording mouse movements.

Their computer might be using a type of encryption to secure data.

Their computer might be tracking eye movements on the screen.

Their computer might be affected by keylogging.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How could Elijah's computer get infected with malware?

Through a large server that stored data of many people, including Elijah

By playing specific audio near Elijah's computer

Through an email attachment Elijah opened

Through physical contact with Elijah's computer

A USB drive he used

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cedric received an email claiming he had won a lottery and asking for his bank details to process the winnings. What is this an example of?

Phishing

Malware

Keylogging

DDoS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keyloggers are always a form of malware

True

False

It's a bit complicated

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Zoie is concerned about the security of her computer. What steps can she take to prevent malware?

Regularly update software, use strong passwords, be cautious of email attachments and links, avoid suspicious websites, and use reputable antivirus software.

Never update software, use weak passwords, click on all email attachments and links, visit suspicious websites, and avoid antivirus software.

Share passwords with others, open all email attachments and links, visit any website, and never use antivirus software.

Use the same password for all accounts, ignore email attachments and links, visit suspicious websites frequently, and never update software.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain how Luna was tricked into revealing her password through social engineering in the context of phishing.

Social engineering in phishing refers to the psychological manipulation of individuals like Luna to deceive them into revealing confidential information such as passwords or performing actions that may compromise security.

Social engineering in phishing refers to the use of advanced encryption techniques to protect sensitive data belonging to individuals like Luna.

Social engineering in phishing is a term used to describe the process of identifying potential phishing targets, such as Luna.

Social engineering in phishing involves physical manipulation of individuals like Luna to deceive them into revealing confidential information.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Jared installed a new application on his computer without realizing it contained a keylogger. What are the potential risks?

Unauthorized access to sensitive information

Improved system performance

Enhanced data encryption

Cheating on a test

Privacy breaches

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?