Search Header Logo

Cyber 2

Authored by Yusuf Khan

Computers

1st Grade

Used 2+ times

Cyber 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 5 pts

What is the term used to describe a malicious software that disguises itself as a legitimate program?

2.

FILL IN THE BLANK QUESTION

1 min • 5 pts

What is the term used to describe a cybersecurity attack that exploits a vulnerability before a patch or fix is available?

3.

FILL IN THE BLANK QUESTION

1 min • 5 pts

Identify the malware which does not replicate or clone through an infection?

4.

OPEN ENDED QUESTION

1 min • 5 pts

What does the term “phishing” refer to in cybersecurity?

Evaluate responses using AI:

OFF

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

Choose the features which violate cyber security.

6.

OPEN ENDED QUESTION

1 min • 5 pts

Which software is mainly used to help users detect viruses and avoid them?

Evaluate responses using AI:

OFF

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

Which one of the following can be considered as the class of computer threats?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?