
Understanding Cyber Threats and Security
Authored by Victoria Price
Information Technology (IT)
11th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a self-replicating program that embeds itself into a device called?
Trojan
Virus
Spyware
Botnet
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware disguises itself as a useful program but is actually a threat?
Spyware
Scareware
Trojan
Virus
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of software can track everything you do online and potentially take control of your device?
Spyware
Ransomware
Botnet
Trojan
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for software that takes control of your computer and demands money to return your files?
Spyware
Botnet
Scareware/Ransomware
Virus
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are networks of hijacked computers connected by the same malware without the user's knowledge called?
Botnets
Trojans
Viruses
Spyware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for hacking for personal gain without permission?
White hat
Grey hat
Black hat
Ethical hacking
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of hacking involves notifying an organisation of their weak points without prior permission?
Black hat
White hat
Grey hat
Red hat
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?