Search Header Logo

Understanding Cyber Security Threats

Authored by Paddy Gbada

Computers

12th Grade

DOK Level 1: Recall covered

Understanding Cyber Security Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mira received an email that looked like it was from her bank, asking her to verify her account information. What is the primary goal of this phishing attack?

To damage hardware

To steal sensitive information

To improve network speed

To install legitimate software

Tags

DOK Level 1: Recall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity class, Benjamin asked, 'Which of the following is a common type of malware?'

Firewall

Antivirus

Trojan Horse

Router

Tags

DOK Level 1: Recall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ava and Charlie are working on a school project when their website suddenly becomes unresponsive. What does a Denial of Service (DoS) attack aim to do?

Steal data

Encrypt files

Overwhelm a system to make it unavailable

Improve system performance

Tags

DOK Level 1: Recall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jacob received an email that appeared to be from his bank, asking him to verify his account information. Which of the following is an example of social engineering?

Using a brute force attack

Sending a phishing email

Installing a firewall

Updating software

Tags

DOK Level 1: Recall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aarav and Matilda discovered that someone had accessed their school's confidential student records without permission. What is this an example of?

A method to improve data storage

Unauthorised access to confidential data

A type of malware

A network upgrade

Tags

DOK Level 1: Recall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emily noticed that a disgruntled employee was leaking information. Which of the following is considered an insider threat?

A hacker from another country

A disgruntled employee leaking information

A phishing email

A DoS attack

Tags

DOK Level 1: Recall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Matilda received an email with an attachment. After opening it, she found that all her files were encrypted and a message appeared demanding payment for decryption. What is the main characteristic of ransomware?

It encrypts files and demands payment for decryption

It speeds up computer performance

It is used to protect data

It is a type of firewall

Tags

DOK Level 1: Recall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?