Cybersecurity

Cybersecurity

12th Grade

•

30 Qs

quiz-placeholder

Similar activities

Basic Needs

Basic Needs

3rd Grade - Professional Development

•

25 Qs

Ultimate office trivia quiz

Ultimate office trivia quiz

KG - Professional Development

•

25 Qs

El Presente

El Presente

9th Grade - University

•

30 Qs

KUIS KATA KERJA MEMAKAI

KUIS KATA KERJA MEMAKAI

9th - 12th Grade

•

25 Qs

STS II PKWU Kelas XII 2024

STS II PKWU Kelas XII 2024

12th Grade

•

25 Qs

1. Introduction to CC Anatomy and Physiology

1. Introduction to CC Anatomy and Physiology

7th - 12th Grade

•

25 Qs

Inside the factory - Biscuits

Inside the factory - Biscuits

1st Grade - University

•

25 Qs

Chapter 10 Vocabulary Quiz

Chapter 10 Vocabulary Quiz

KG - University

•

25 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

•

Other

•

12th Grade

•

Practice Problem

•

Medium

Created by

Marian Somera

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of malicious software infects and spreads by attaching itself to legitimate files or programs?

Worm
File infector
Trojan horse
Spyware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a broad category of malicious programs designed to cause harm to computer systems or users?

Spyware
Ransomware
Malware
Firewall

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of social engineering attack involves tricking users into providing sensitive information by posing as a trustworthy entity?

Vishing
Smishing
Spoofing
Phishing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of malware encrypts files or locks computer systems, demanding a ransom for their release?

Ransomware
Spyware
Trojan horse
Phishing

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of malware secretly monitors and collects information about a user's activities without their knowledge or consent?

Spyware
Ransomware
Adware
Trojan horse

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a network of compromised computers or devices infected with malware and controlled remotely by a malicious actor called?

malwarenet
virusweb
botnet
trojanmesh

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What are software vulnerabilities or weaknesses that are unknown to the software vendor or developers and have not been patched or fixed?

zero-day vulnerabilities
early-day vulnerabilities
pre-day vulnerabilities
first-day vulnerabilities

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?