
Understanding the Threat to Digital Systems
Authored by James Evans
Computers
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of malware?
Firewall
Worm
Encryption
Backup
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of ransomware?
To encrypt files and demand payment for decryption
To log keystrokes
To overload a network with traffic
To steal passwords
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a Trojan differ from a virus?
A Trojan replicates itself while a virus does not
A Trojan disguises itself as legitimate software
A Trojan infects other files directly
A Trojan can only harm hardware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware records a user's keystrokes?
Spyware
Ransomware
Keylogger
Worm
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a technical vulnerability?
A user opening a phishing email
Using out-of-date anti-malware software
Forgetting a password
Sharing login credentials
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is social engineering in the context of cybersecurity?
Exploiting technical vulnerabilities
Using manipulation to trick people into giving access
Developing new software tools
Encrypting data to protect it
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack method is based on social engineering?
Phishing
SQL injection
DDoS attack
Malware infection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?