Search Header Logo

lesson 5

Authored by CARLO SANTUICO

Other

Professional Development

Used 10+ times

lesson 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What term describes a type of malicious software designed to block access to a computer system until a sum of money is paid?

virus

trojan

ransomware

worm

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

WWhich of the following is NOT a common type of malware?

spyware

firewall

adware

rootkit

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following best describes a Trojan horse?

A type of malware that spreads rapidly through a network

Malicious software that encrypts files and demands payment for decryption

Software that disguises itself as legitimate but contains harmful code

A form of malware that steals sensitive information

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the primary purpose of a firewall?

To detect and remove malware from a computer system

To prevent unauthorized access to a network or computer system

To encrypt data transmissions over a network

To back up important files and folders

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What type of malware is specifically designed to monitor and record user activities on a computer?

Spyware

Worm

rootkit

Adware

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following is an example of a social engineering attack?

SQL injection

Distributed Denial of Service (DDoS)

Phishing

Cross-site scripting (XSS)

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the term for a cybersecurity attack in which an attacker attempts to gain unauthorized access to a system by repeatedly guessing passwords?

Brute force attack

Man-in-the-middle attack

Buffer overflow attack

Denial of Service (DoS) attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?