Cybersecurity Key Terms 4, 5, and 6

Cybersecurity Key Terms 4, 5, and 6

8th Grade

18 Qs

quiz-placeholder

Similar activities

Computer Systems and Safety Assessment

Computer Systems and Safety Assessment

8th Grade

20 Qs

DIG08 Revision

DIG08 Revision

8th Grade

20 Qs

Computer Network and Wireless Network

Computer Network and Wireless Network

7th Grade - University

18 Qs

TLE 8 - Quiz 2: Visual Arts and Telecommunication

TLE 8 - Quiz 2: Visual Arts and Telecommunication

8th Grade

15 Qs

ICT 7 Module 3

ICT 7 Module 3

6th - 8th Grade

13 Qs

LATIHAN SOAL PERKAKAS PERETASAN

LATIHAN SOAL PERKAKAS PERETASAN

8th Grade

20 Qs

TOOLS AND EQUIPMENT IN COMPUTER PROGRAMMING

TOOLS AND EQUIPMENT IN COMPUTER PROGRAMMING

8th Grade

15 Qs

ulangan harian

ulangan harian

8th Grade

20 Qs

Cybersecurity Key Terms 4, 5, and 6

Cybersecurity Key Terms 4, 5, and 6

Assessment

Quiz

Information Technology (IT)

8th Grade

Easy

Created by

Linda Berkheimer

Used 3+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a form of malware?

Zero-day vulnerability

Logic Bomb

Worm

Trojan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which threat is identified as its ability to remain hidden for long periods of time?

Advanced persistent threat (APT)

Polymorphic virus

Trojan

Armored virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware encrypts data so the user cannot access it unless a fee is paid to the hacker?

Trojan

Ransomware

Rootkit

Polymorphic

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines a zero-day vulnerability?

Software that has been installed directly on hardware

Personal information found in the trash

Technology that tracks a user’s keystrokes

A vulnerability that has existed in software since its release

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cookie only exists when visiting a website and is deleted once the browser is closed?

Session cookies

Persistent cookies

Secure cookies

Third-party cookies

6.

DRAG AND DROP QUESTION

30 sec • 1 pt

Social engineering often relies on (a)   , which is the use of lies or scams to obtain private information.

Phishing

Pretexting

Baiting

Quizzing

7.

DROPDOWN QUESTION

30 sec • 1 pt

A phishing attack in which the recipients are deliberately chosen for attack is known as (a)   .

Spear phishing

Watering hole

Pharming

Whale phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?