
Cyber 2
Authored by Yusuf Khan
Computers
1st Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 5 pts
What is the term used to describe a malicious software that disguises itself as a legitimate program?
2.
FILL IN THE BLANK QUESTION
1 min • 5 pts
What is the term used to describe a cybersecurity attack that exploits a vulnerability before a patch or fix is available?
3.
FILL IN THE BLANK QUESTION
1 min • 5 pts
Identify the malware which does not replicate or clone through an infection?
4.
OPEN ENDED QUESTION
1 min • 5 pts
What does the term “phishing” refer to in cybersecurity?
Evaluate responses using AI:
OFF
5.
FILL IN THE BLANK QUESTION
1 min • 5 pts
Choose the features which violate cyber security.
6.
OPEN ENDED QUESTION
1 min • 5 pts
Which software is mainly used to help users detect viruses and avoid them?
Evaluate responses using AI:
OFF
7.
FILL IN THE BLANK QUESTION
1 min • 5 pts
Which one of the following can be considered as the class of computer threats?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?