
0984 U5T5 Cybersecurity threats
Authored by R Mears
Computers
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Isabella is trying to protect her online accounts. Which of the following is a type of cyber security threat that involves attempting to gain unauthorised access to a system by systematically trying all possible passwords?
Data interception
Brute-force attack
Pharming
Phishing
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
During a cybersecurity class, Elsie and Muhammad learned about different types of cyber attacks. What is the primary aim of a Distributed Denial of Service (DDoS) attack?
To steal sensitive data
To disrupt the normal traffic of a targeted server, service, or network
To install malware on a system
To intercept communications
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
During a computer science class, Lily asked, 'Which type of malware is specifically designed to spread from one computer to another?'
Virus
Spyware
Adware
Worm
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Neha received an email that appeared to be from her bank, asking her to verify her account information. This is an example of:
Gaining unauthorised access to a system by trying all possible passwords
Disrupting the normal traffic of a targeted server
Tricking individuals into providing sensitive information
Redirecting users to fraudulent websites
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Grace and Eesha are discussing different types of malware in their cybersecurity class. Which of the following is NOT considered a type of malware?
Virus
Worm
Trojan horse
Data interception
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
During a cybersecurity class, Sophia asked, 'Which of the following is NOT considered malware?'
Virus
Worm
Trojan horse
Firewall
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Alexander wants to protect his computer from harmful software. Which of the following is a method he should use?
Installing anti-malware
Ignoring software updates
Disabling firewalls
Using weak passwords
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
55 questions
Soal Informatika Kelas 10 Semester 1
Quiz
•
10th Grade
60 questions
Remedial XTKJ Pemrograman Dasar PAS GJL
Quiz
•
10th Grade
60 questions
Cultura Digital I
Quiz
•
9th - 12th Grade
59 questions
HTML, CSS, and Design
Quiz
•
6th - 12th Grade
56 questions
PH INFOR KELAS X
Quiz
•
2nd Grade - University
58 questions
Digital Marketing
Quiz
•
10th Grade
63 questions
BTEC L2 IT Online World Aim A Quiz
Quiz
•
6th - 10th Grade
60 questions
Orientasi Dasar Perangkat Lunak dan Gim
Quiz
•
10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
14 questions
[AP CSP] JavaScript Programming Quiz
Quiz
•
9th - 12th Grade
10 questions
Understanding Computers and Computer Engineering
Interactive video
•
7th - 12th Grade
37 questions
Python - Tuples, Lists, and List Methods
Quiz
•
9th - 12th Grade