Understanding Malware and Social Engineering

Understanding Malware and Social Engineering

7th Grade

16 Qs

quiz-placeholder

Similar activities

[AP CSP] Malware & Phishing Scams

[AP CSP] Malware & Phishing Scams

9th - 12th Grade

21 Qs

IC3: Computing Fundamentals

IC3: Computing Fundamentals

7th - 9th Grade

20 Qs

3.6 - Cyber Security

3.6 - Cyber Security

10th Grade

15 Qs

Digital Literacy

Digital Literacy

10th - 12th Grade

18 Qs

تحدي المخترقين 2.0

تحدي المخترقين 2.0

University

15 Qs

Empowerment Technologies

Empowerment Technologies

11th - 12th Grade

20 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

Chapter 1: Getting Started with Digital Media

Chapter 1: Getting Started with Digital Media

12th Grade

19 Qs

Understanding Malware and Social Engineering

Understanding Malware and Social Engineering

Assessment

Quiz

Computers

7th Grade

Medium

Created by

Anne-Marie Aitken

Used 3+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software used to protect your computer

Software made to harm or exploit your computer

Hardware used to make your computer faster

A type of software used for making documents

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware?

Antivirus

Firewall

Trojan Horse

Word Processor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A technique used to catch fish

A method of cooking

A technique used to trick people into giving personal information

A type of computer game

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a common phishing technique?

Sending a legitimate email from a known contact

Sending an email that appears to be from a trusted source asking for sensitive information

Sending a text message to say hello

Sending a postcard

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in cybersecurity?

Building social networks

Tricking people into giving confidential information

Designing social media platforms

Engineering social events

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a social engineering tactic?

Offering free software updates

Pretending to be a trusted person to gain information

Installing antivirus software

Creating a new social media account

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you identify a fake email?

It always comes from a known contact

It often contains spelling and grammar mistakes

It never asks for personal information

It always has a professional tone

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?