Understanding Cyber Security Threats

Understanding Cyber Security Threats

12th Grade

24 Qs

quiz-placeholder

Similar activities

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade - University

19 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

[AP CSP] Malware & Phishing Scams

[AP CSP] Malware & Phishing Scams

9th - 12th Grade

21 Qs

Data Security Terms

Data Security Terms

12th Grade

22 Qs

Basic of Computers

Basic of Computers

6th - 12th Grade

20 Qs

Chapter 1: Getting Started with Digital Media

Chapter 1: Getting Started with Digital Media

12th Grade

19 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

20 Qs

Empowerment Technologies

Empowerment Technologies

11th - 12th Grade

20 Qs

Understanding Cyber Security Threats

Understanding Cyber Security Threats

Assessment

Quiz

Computers

12th Grade

Hard

DOK Level 1: Recall

Standards-aligned

Created by

Paddy Gbada

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mira received an email that looked like it was from her bank, asking her to verify her account information. What is the primary goal of this phishing attack?

To damage hardware

To steal sensitive information

To improve network speed

To install legitimate software

Tags

DOK Level 1: Recall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity class, Benjamin asked, 'Which of the following is a common type of malware?'

Firewall

Antivirus

Trojan Horse

Router

Tags

DOK Level 1: Recall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ava and Charlie are working on a school project when their website suddenly becomes unresponsive. What does a Denial of Service (DoS) attack aim to do?

Steal data

Encrypt files

Overwhelm a system to make it unavailable

Improve system performance

Tags

DOK Level 1: Recall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jacob received an email that appeared to be from his bank, asking him to verify his account information. Which of the following is an example of social engineering?

Using a brute force attack

Sending a phishing email

Installing a firewall

Updating software

Tags

DOK Level 1: Recall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aarav and Matilda discovered that someone had accessed their school's confidential student records without permission. What is this an example of?

A method to improve data storage

Unauthorised access to confidential data

A type of malware

A network upgrade

Tags

DOK Level 1: Recall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emily noticed that a disgruntled employee was leaking information. Which of the following is considered an insider threat?

A hacker from another country

A disgruntled employee leaking information

A phishing email

A DoS attack

Tags

DOK Level 1: Recall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Matilda received an email with an attachment. After opening it, she found that all her files were encrypted and a message appeared demanding payment for decryption. What is the main characteristic of ransomware?

It encrypts files and demands payment for decryption

It speeds up computer performance

It is used to protect data

It is a type of firewall

Tags

DOK Level 1: Recall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?