Search Header Logo

Spring Term 1 H/W - Understanding Cyber Security Threats

Authored by Julian Hooper

Computers

8th Grade

Used 1+ times

Spring Term 1 H/W - Understanding Cyber Security Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is Phishing?

Web pages you have visited that are stored on your hard drive

Text files some websites use to identify users

A scam to get confidential information

A form where you type confidential information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of these is an example of social engineering?

A Trojan Horse

Ransomware

A Phishing Email

A Virus

Answer explanation

A Phishing Email is a form of social engineering where attackers deceive individuals into providing sensitive information by pretending to be a trustworthy entity. This tactic exploits human psychology, unlike malware like Trojans or viruses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common type of cyber threat that involves tricking individuals into revealing personal information?

Phishing

Malware

Ransomware

Hacking

Answer explanation

Phishing is a common cyber threat that deceives individuals into providing personal information, often through fake emails or websites. Unlike malware or ransomware, which involve software attacks, phishing specifically targets human behavior.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One day, Finn and Harry W were having a heated debate about the most annoying type of malware. Finn claimed it was the one that sneaks into your computer and demands a ransom, just like a digital kidnapper. Which type of malware was Finn talking about?

Spyware

Adware

Ransomware

Trojan

Answer explanation

Ransomware is a type of malware that encrypts a user's files and demands payment for the decryption key. Unlike spyware, adware, or trojans, its primary goal is to extort money from victims.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why did Finn and Harry W decide to become social engineers?

To steal Finn's collection of rare potato chips

To gain confidential information about Harry W's secret cookie recipe

To damage Finn's favorite video game

To improve the speed of their internet for faster cat video streaming

Answer explanation

The primary goal of social engineering attacks is to gain confidential information by manipulating individuals into divulging sensitive data, rather than stealing hardware, damaging software, or improving network speed.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Finn and Harry W were having a heated debate about computer security. Finn claimed he knew all about malware, but Harry W challenged him to identify which of the following is NOT a type of malware. Can you help Finn out?

Virus

Worm

Firewall

Trojan

Answer explanation

A firewall is not a type of malware; it is a security system that monitors and controls incoming and outgoing network traffic. In contrast, a virus, worm, and Trojan are all types of malware designed to harm or exploit systems.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Finn received an email from "Harry W's Magical Bank" asking for his secret wizard password. What is this trickery called?

Spam

Phishing

Spoofing

Sniffing

Answer explanation

The term for a fake email that appears to be from a legitimate source, asking for sensitive information, is 'Phishing'. This type of scam aims to trick individuals into providing personal data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?