lesson 5

lesson 5

Professional Development

10 Qs

quiz-placeholder

Similar activities

Zero day

Zero day

12th Grade - Professional Development

10 Qs

Technologies in the Digital Classroom

Technologies in the Digital Classroom

Professional Development

10 Qs

Cyber Fraud Training

Cyber Fraud Training

Professional Development

10 Qs

Insider Threats Quiz

Insider Threats Quiz

Professional Development

15 Qs

Sony Pictures Hack

Sony Pictures Hack

Professional Development

6 Qs

Cybersecurity_1

Cybersecurity_1

Professional Development

5 Qs

Phishing - Learning Tales

Phishing - Learning Tales

Professional Development

10 Qs

lesson 5

lesson 5

Assessment

Quiz

Other

Professional Development

Medium

Created by

CARLO SANTUICO

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What term describes a type of malicious software designed to block access to a computer system until a sum of money is paid?

virus

trojan

ransomware

worm

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

WWhich of the following is NOT a common type of malware?

spyware

firewall

adware

rootkit

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following best describes a Trojan horse?

A type of malware that spreads rapidly through a network

Malicious software that encrypts files and demands payment for decryption

Software that disguises itself as legitimate but contains harmful code

A form of malware that steals sensitive information

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the primary purpose of a firewall?

To detect and remove malware from a computer system

To prevent unauthorized access to a network or computer system

To encrypt data transmissions over a network

To back up important files and folders

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What type of malware is specifically designed to monitor and record user activities on a computer?

Spyware

Worm

rootkit

Adware

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following is an example of a social engineering attack?

SQL injection

Distributed Denial of Service (DDoS)

Phishing

Cross-site scripting (XSS)

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the term for a cybersecurity attack in which an attacker attempts to gain unauthorized access to a system by repeatedly guessing passwords?

Brute force attack

Man-in-the-middle attack

Buffer overflow attack

Denial of Service (DoS) attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?