Search Header Logo

Cybersecurity Key Terms 4, 5, and 6

Authored by Linda Berkheimer

Information Technology (IT)

8th Grade

Used 3+ times

Cybersecurity Key Terms 4, 5, and 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a form of malware?

Zero-day vulnerability

Logic Bomb

Worm

Trojan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which threat is identified as its ability to remain hidden for long periods of time?

Advanced persistent threat (APT)

Polymorphic virus

Trojan

Armored virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware encrypts data so the user cannot access it unless a fee is paid to the hacker?

Trojan

Ransomware

Rootkit

Polymorphic

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines a zero-day vulnerability?

Software that has been installed directly on hardware

Personal information found in the trash

Technology that tracks a user’s keystrokes

A vulnerability that has existed in software since its release

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cookie only exists when visiting a website and is deleted once the browser is closed?

Session cookies

Persistent cookies

Secure cookies

Third-party cookies

6.

DRAG AND DROP QUESTION

30 sec • 1 pt

Social engineering often relies on (a)   , which is the use of lies or scams to obtain private information.

Phishing

Pretexting

Baiting

Quizzing

7.

DROPDOWN QUESTION

30 sec • 1 pt

A phishing attack in which the recipients are deliberately chosen for attack is known as (a)   .

Spear phishing

Watering hole

Pharming

Whale phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?