
0984 U5T5 Cybersecurity threats

Quiz
•
Computers
•
10th Grade
•
Medium
R Mears
Used 1+ times
FREE Resource
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Isabella is trying to protect her online accounts. Which of the following is a type of cyber security threat that involves attempting to gain unauthorised access to a system by systematically trying all possible passwords?
Data interception
Brute-force attack
Pharming
Phishing
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
During a cybersecurity class, Elsie and Muhammad learned about different types of cyber attacks. What is the primary aim of a Distributed Denial of Service (DDoS) attack?
To steal sensitive data
To disrupt the normal traffic of a targeted server, service, or network
To install malware on a system
To intercept communications
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
During a computer science class, Lily asked, 'Which type of malware is specifically designed to spread from one computer to another?'
Virus
Spyware
Adware
Worm
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Neha received an email that appeared to be from her bank, asking her to verify her account information. This is an example of:
Gaining unauthorised access to a system by trying all possible passwords
Disrupting the normal traffic of a targeted server
Tricking individuals into providing sensitive information
Redirecting users to fraudulent websites
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Grace and Eesha are discussing different types of malware in their cybersecurity class. Which of the following is NOT considered a type of malware?
Virus
Worm
Trojan horse
Data interception
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
During a cybersecurity class, Sophia asked, 'Which of the following is NOT considered malware?'
Virus
Worm
Trojan horse
Firewall
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Alexander wants to protect his computer from harmful software. Which of the following is a method he should use?
Installing anti-malware
Ignoring software updates
Disabling firewalls
Using weak passwords
Create a free account and access millions of resources
Similar Resources on Wayground
57 questions
CS: Python Unit 1 Review

Quiz
•
9th - 12th Grade
63 questions
APCSP Midterm

Quiz
•
9th - 12th Grade
57 questions
Cybersecurity Quiz

Quiz
•
10th Grade
55 questions
Uji Kompetesi

Quiz
•
1st - 12th Grade
65 questions
PTI (susulan) - UAS

Quiz
•
10th Grade - University
57 questions
Word Processing and Database Management Quiz

Quiz
•
10th Grade
60 questions
Syed: Chapter 4.1: Software

Quiz
•
9th - 12th Grade
55 questions
Cyber Security Quiz

Quiz
•
10th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
1.2 OSI & TCP IP Models Quiz

Quiz
•
10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade