Understanding Cyber Threats and Security

Understanding Cyber Threats and Security

11th Grade

16 Qs

quiz-placeholder

Similar activities

IT group 2 quiz

IT group 2 quiz

9th - 12th Grade

11 Qs

KEAMANAN JARINGAN - ULANGAN HARIAN 1

KEAMANAN JARINGAN - ULANGAN HARIAN 1

11th Grade

20 Qs

Quiz TIK kelas  9

Quiz TIK kelas 9

9th - 12th Grade

20 Qs

Malware Quiz

Malware Quiz

11th Grade

15 Qs

Dampak Sosial Informatika

Dampak Sosial Informatika

9th Grade - University

16 Qs

BTEC IT Implication of Threats LAD

BTEC IT Implication of Threats LAD

11th Grade

15 Qs

Penilaian Akhir Semester Informatika

Penilaian Akhir Semester Informatika

9th - 12th Grade

20 Qs

Latihan Soal PSAS Informatika 11

Latihan Soal PSAS Informatika 11

11th Grade

20 Qs

Understanding Cyber Threats and Security

Understanding Cyber Threats and Security

Assessment

Quiz

Information Technology (IT)

11th Grade

Easy

Created by

Victoria Price

Used 3+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a self-replicating program that embeds itself into a device called?

Trojan

Virus

Spyware

Botnet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware disguises itself as a useful program but is actually a threat?

Spyware

Scareware

Trojan

Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of software can track everything you do online and potentially take control of your device?

Spyware

Ransomware

Botnet

Trojan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for software that takes control of your computer and demands money to return your files?

Spyware

Botnet

Scareware/Ransomware

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are networks of hijacked computers connected by the same malware without the user's knowledge called?

Botnets

Trojans

Viruses

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for hacking for personal gain without permission?

White hat

Grey hat

Black hat

Ethical hacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacking involves notifying an organisation of their weak points without prior permission?

Black hat

White hat

Grey hat

Red hat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?