Cyber Fraud and Security

Cyber Fraud and Security

11th Grade

8 Qs

quiz-placeholder

Similar activities

PKPJ_pass_ok

PKPJ_pass_ok

11th Grade

10 Qs

kelompok uuuweeekk

kelompok uuuweeekk

11th Grade

10 Qs

Quizz jobs

Quizz jobs

11th Grade

10 Qs

Trọng âm

Trọng âm

11th Grade

10 Qs

discovering tut 11th class

discovering tut 11th class

11th Grade

10 Qs

Understanding National Defense

Understanding National Defense

11th Grade

10 Qs

Understanding KTR HKI Concepts

Understanding KTR HKI Concepts

11th Grade

10 Qs

habib

habib

11th Grade

7 Qs

Cyber Fraud and Security

Cyber Fraud and Security

Assessment

Quiz

Others

11th Grade

Easy

Created by

Рина Лукьянова

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main motivation for hackers?

Thrill

For being caught

Gaining money

Righting perceived wrongs

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malware attack is

Money Software

Maltronic Software

Malicious Software

Malteasers Software

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You may use unsecured public Wi-Fi networks for shopping and banking online

Yes

No

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the special online tool for checking reliability of websites?

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You should not respond to an email, text or message asking for financial, personal or security information.

Yes

No

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a cyberattack like Trojan designed to enter and destroy your computer system or to steal personal data:

Fishing

Man-in-the-Middle attack

Password attack

Spyware attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Designed to detect and destroy suspicious activity or virus

Antivirus

Firewall

Sensor

Biometry

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules:

Antivirus

Firewall

Sensor

Biometry