CYBER SECURITY VOCABULARY

CYBER SECURITY VOCABULARY

10 Qs

quiz-placeholder

Similar activities

Gateway B1 Unit 4

Gateway B1 Unit 4

KG - University

10 Qs

Copy of Cold War in the Middle East

Copy of Cold War in the Middle East

KG - University

8 Qs

o4 L11 Quiz - External Threats

o4 L11 Quiz - External Threats

KG - University

10 Qs

Unbroken: Part Two & Three Quiz

Unbroken: Part Two & Three Quiz

KG - University

14 Qs

Cybersecurity quiz

Cybersecurity quiz

6th - 8th Grade

10 Qs

Restart Chapter 24

Restart Chapter 24

KG - University

14 Qs

Malware & Anti-Malware Quiz

Malware & Anti-Malware Quiz

KG - University

10 Qs

Mid-Unit 4 Social Studies Assessment: Civil War

Mid-Unit 4 Social Studies Assessment: Civil War

4th Grade

10 Qs

CYBER SECURITY VOCABULARY

CYBER SECURITY VOCABULARY

Assessment

Quiz

others

Medium

Created by

Alan Leonel Vera

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. What is the type of malware that demands a ransom to release encrypted data?
a) Adware
b) Spyware
c) Ransomware
d) Keylogger

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. Which of the following is an attack that overwhelms a system with traffic to make it unavailable?
a) Phishing
b) Denial of Service (DoS)
c) Rootkit
d) Cross-Site Scripting (XSS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. What is a Trojan?
a) A type of spyware that records keystrokes.
b) A malicious program disguised as legitimate software.
c) Malware that spreads across networks.
d) A program that displays unwanted advertisements.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. Which type of malware secretly monitors user activity?
a) Worm
b) Spyware
c) Botnet
d) Rootkit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which cyber attack deceives users into revealing sensitive information by pretending to be a trusted entity?
a) Phishing
b) Brute Force Attack
c) Cryptojacking
d) Zero-Day Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. What does a Keylogger do?
a) Overload a system with traffic.
b) Record keystrokes to steal sensitive data.
c) Encrypt data and demand a ransom.
d) Spread malware across networks.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which malware gives attackers access to the root or kernel of a system?
a) Worm
b) Rootkit
c) Adware
d) Keylogger

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?