Cybersecurity Key Terms 4, 5, and 6

Cybersecurity Key Terms 4, 5, and 6

8th Grade

18 Qs

quiz-placeholder

Similar activities

IT Career and College Pathways

IT Career and College Pathways

8th Grade

18 Qs

Cybersecurity Quiz for 8th Graders

Cybersecurity Quiz for 8th Graders

8th Grade

23 Qs

Year 9 revision

Year 9 revision

8th Grade

20 Qs

Cybercrime exercise

Cybercrime exercise

7th Grade - University

23 Qs

8.º - Segurança Ambientes Digitais

8.º - Segurança Ambientes Digitais

8th Grade

15 Qs

QUIZ TIK Kelas 8

QUIZ TIK Kelas 8

8th Grade

20 Qs

Data Privacy and Cybersecurity Quiz

Data Privacy and Cybersecurity Quiz

8th Grade

17 Qs

Quiz on Iterative Development in Python Programming

Quiz on Iterative Development in Python Programming

8th Grade

14 Qs

Cybersecurity Key Terms 4, 5, and 6

Cybersecurity Key Terms 4, 5, and 6

Assessment

Quiz

Information Technology (IT)

8th Grade

Easy

Created by

Linda Berkheimer

Used 3+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a form of malware?

Zero-day vulnerability

Logic Bomb

Worm

Trojan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which threat is identified as its ability to remain hidden for long periods of time?

Advanced persistent threat (APT)

Polymorphic virus

Trojan

Armored virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware encrypts data so the user cannot access it unless a fee is paid to the hacker?

Trojan

Ransomware

Rootkit

Polymorphic

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines a zero-day vulnerability?

Software that has been installed directly on hardware

Personal information found in the trash

Technology that tracks a user’s keystrokes

A vulnerability that has existed in software since its release

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cookie only exists when visiting a website and is deleted once the browser is closed?

Session cookies

Persistent cookies

Secure cookies

Third-party cookies

6.

DRAG AND DROP QUESTION

30 sec • 1 pt

Social engineering often relies on (a)   , which is the use of lies or scams to obtain private information.

Phishing

Pretexting

Baiting

Quizzing

7.

DROPDOWN QUESTION

30 sec • 1 pt

A phishing attack in which the recipients are deliberately chosen for attack is known as (a)   .

Spear phishing

Watering hole

Pharming

Whale phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?