
Cybersecurity Key Terms 4, 5, and 6
Authored by Linda Berkheimer
Information Technology (IT)
8th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a form of malware?
Zero-day vulnerability
Logic Bomb
Worm
Trojan
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which threat is identified as its ability to remain hidden for long periods of time?
Advanced persistent threat (APT)
Polymorphic virus
Trojan
Armored virus
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware encrypts data so the user cannot access it unless a fee is paid to the hacker?
Trojan
Ransomware
Rootkit
Polymorphic
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best defines a zero-day vulnerability?
Software that has been installed directly on hardware
Personal information found in the trash
Technology that tracks a user’s keystrokes
A vulnerability that has existed in software since its release
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of cookie only exists when visiting a website and is deleted once the browser is closed?
Session cookies
Persistent cookies
Secure cookies
Third-party cookies
6.
DRAG AND DROP QUESTION
30 sec • 1 pt
Social engineering often relies on (a) , which is the use of lies or scams to obtain private information.
Phishing
Pretexting
Baiting
Quizzing
7.
DROPDOWN QUESTION
30 sec • 1 pt
A phishing attack in which the recipients are deliberately chosen for attack is known as (a) .
Spear phishing
Watering hole
Pharming
Whale phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?