lesson 5

lesson 5

Professional Development

10 Qs

quiz-placeholder

Similar activities

Fortinet 12 Agustus

Fortinet 12 Agustus

Professional Development

10 Qs

Anime 99

Anime 99

9th Grade - Professional Development

13 Qs

FORUM PERDANA EHWAL ISLAM: MENJUNJUNG KASIHMU RASULULLAH

FORUM PERDANA EHWAL ISLAM: MENJUNJUNG KASIHMU RASULULLAH

1st Grade - Professional Development

10 Qs

IPERC

IPERC

Professional Development

10 Qs

Post Test Penyusunan LK 2022

Post Test Penyusunan LK 2022

Professional Development

10 Qs

Chiva_9 mayo

Chiva_9 mayo

Professional Development

10 Qs

Preguntas aleatorias ;)

Preguntas aleatorias ;)

6th Grade - Professional Development

11 Qs

How Well Do You Know Glenn?

How Well Do You Know Glenn?

Professional Development

10 Qs

lesson 5

lesson 5

Assessment

Quiz

Other

Professional Development

Practice Problem

Medium

Created by

CARLO SANTUICO

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What term describes a type of malicious software designed to block access to a computer system until a sum of money is paid?

virus

trojan

ransomware

worm

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

WWhich of the following is NOT a common type of malware?

spyware

firewall

adware

rootkit

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following best describes a Trojan horse?

A type of malware that spreads rapidly through a network

Malicious software that encrypts files and demands payment for decryption

Software that disguises itself as legitimate but contains harmful code

A form of malware that steals sensitive information

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the primary purpose of a firewall?

To detect and remove malware from a computer system

To prevent unauthorized access to a network or computer system

To encrypt data transmissions over a network

To back up important files and folders

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What type of malware is specifically designed to monitor and record user activities on a computer?

Spyware

Worm

rootkit

Adware

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following is an example of a social engineering attack?

SQL injection

Distributed Denial of Service (DDoS)

Phishing

Cross-site scripting (XSS)

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the term for a cybersecurity attack in which an attacker attempts to gain unauthorized access to a system by repeatedly guessing passwords?

Brute force attack

Man-in-the-middle attack

Buffer overflow attack

Denial of Service (DoS) attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?