E-Security

E-Security

11th Grade

31 Qs

quiz-placeholder

Similar activities

Cyber Crime

Cyber Crime

12th Grade

30 Qs

Cybersecurity Web Vulnerabilities

Cybersecurity Web Vulnerabilities

University

26 Qs

Data Security Breach

Data Security Breach

University

33 Qs

Internal and External Threats

Internal and External Threats

12th Grade

32 Qs

BTEC ICT Unit 1 - The Online World - Part 1

BTEC ICT Unit 1 - The Online World - Part 1

10th - 11th Grade

30 Qs

internet terms gpaul

internet terms gpaul

6th Grade - University

32 Qs

External threats

External threats

KG - Professional Development

26 Qs

Information Assurance Prefinal Quiz

Information Assurance Prefinal Quiz

University

30 Qs

E-Security

E-Security

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Ayorinde Omojuwa

Used 2+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is the name of an application that appears to look like a helpful application but instead does harm to your computer?
virus
worm
malware
Trojan horse

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IT security recently found a program on your co-worker's computer that apparently tracked all of the words that they typed into the computer. what kind of malware is this?
Keylogger 
keyblogger
trojan horse
keystroke virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rose just installed a new search engine on her laptop.now whenever she searches the internet, she gets several pop-up windows directing her to buy products.what does rose have?
ransomware
spyware
Adware
trojan horse

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You were browsing the web on a questionable website, and now you get a pop-up window stating that if you do not pay $100 within one hour, all files on your computer will be destroyed.what is this an example of?
heistware
theftware
extortionware
Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "spam" refer to in computing?
excessive pop-up windows
unsolicited emails
social engineering attemps
installing malware on a computer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

David just heard of a program that if installed on your computer gives the attacker administrator-like access to your machine. what type of software is he talking about?
trojan horse
spyware
ransomeware
rootkit

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are activities that a hacker might attempt?
Stealing usernames and passwords
Modifying website content
Disrupting network communications
All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?