Spring Term 1 H/W - Understanding Cyber Security Threats

Spring Term 1 H/W - Understanding Cyber Security Threats

8th Grade

15 Qs

quiz-placeholder

Similar activities

Conocimientos PIDIPI🎯

Conocimientos PIDIPI🎯

1st - 12th Grade

15 Qs

Phishing

Phishing

4th - 8th Grade

18 Qs

Bezpieczny_Internet

Bezpieczny_Internet

8th Grade

10 Qs

DBI 2025

DBI 2025

6th - 8th Grade

10 Qs

Python list

Python list

8th Grade

20 Qs

Safe or Unsafe?

Safe or Unsafe?

5th - 9th Grade

16 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Virus and Anti-Virus

Virus and Anti-Virus

8th Grade

10 Qs

Spring Term 1 H/W - Understanding Cyber Security Threats

Spring Term 1 H/W - Understanding Cyber Security Threats

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Julian Hooper

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is Phishing?

Web pages you have visited that are stored on your hard drive

Text files some websites use to identify users

A scam to get confidential information

A form where you type confidential information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of these is an example of social engineering?

A Trojan Horse

Ransomware

A Phishing Email

A Virus

Answer explanation

A Phishing Email is a form of social engineering where attackers deceive individuals into providing sensitive information by pretending to be a trustworthy entity. This tactic exploits human psychology, unlike malware like Trojans or viruses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common type of cyber threat that involves tricking individuals into revealing personal information?

Phishing

Malware

Ransomware

Hacking

Answer explanation

Phishing is a common cyber threat that deceives individuals into providing personal information, often through fake emails or websites. Unlike malware or ransomware, which involve software attacks, phishing specifically targets human behavior.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One day, Finn and Harry W were having a heated debate about the most annoying type of malware. Finn claimed it was the one that sneaks into your computer and demands a ransom, just like a digital kidnapper. Which type of malware was Finn talking about?

Spyware

Adware

Ransomware

Trojan

Answer explanation

Ransomware is a type of malware that encrypts a user's files and demands payment for the decryption key. Unlike spyware, adware, or trojans, its primary goal is to extort money from victims.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why did Finn and Harry W decide to become social engineers?

To steal Finn's collection of rare potato chips

To gain confidential information about Harry W's secret cookie recipe

To damage Finn's favorite video game

To improve the speed of their internet for faster cat video streaming

Answer explanation

The primary goal of social engineering attacks is to gain confidential information by manipulating individuals into divulging sensitive data, rather than stealing hardware, damaging software, or improving network speed.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Finn and Harry W were having a heated debate about computer security. Finn claimed he knew all about malware, but Harry W challenged him to identify which of the following is NOT a type of malware. Can you help Finn out?

Virus

Worm

Firewall

Trojan

Answer explanation

A firewall is not a type of malware; it is a security system that monitors and controls incoming and outgoing network traffic. In contrast, a virus, worm, and Trojan are all types of malware designed to harm or exploit systems.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Finn received an email from "Harry W's Magical Bank" asking for his secret wizard password. What is this trickery called?

Spam

Phishing

Spoofing

Sniffing

Answer explanation

The term for a fake email that appears to be from a legitimate source, asking for sensitive information, is 'Phishing'. This type of scam aims to trick individuals into providing personal data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?