Protect your computer Y7

Protect your computer Y7

7th Grade

18 Qs

quiz-placeholder

Similar activities

Network Architectures

Network Architectures

7th - 12th Grade

22 Qs

Jaringan Komputer

Jaringan Komputer

7th Grade - University

15 Qs

Pertemuan 1&2

Pertemuan 1&2

7th - 8th Grade

20 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

Year 7 Test Autumn Term 2

Year 7 Test Autumn Term 2

7th Grade

21 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Networking Concepts

Networking Concepts

6th - 7th Grade

16 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Protect your computer Y7

Protect your computer Y7

Assessment

Quiz

Computers

7th Grade

Hard

Created by

Edy Pierre Bou Raad

Used 12+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A __________ is any unauthorized attempt to access, steal, or damage a computer network, system, or data. Cyberattacks are illegal and punishable by law.

cyberattack

cybesecurity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ are computer experts who use their vast technical knowledge to perform a cyberattack in order to gain unauthorized access to a computer system.

Cybersecurity

Hackers

Cyberattacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware (short for malicious software) is one of the most common forms of cyberattack. Malware is a type of software that has been programmed to gain unauthorized access to a user’s network, computer, or system.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ is a kind of malware that locks users out of their  computer systems unless a sum of money is paid.

Ransomware

virus

worm

spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ________is a program that attaches itself to executable files to infect  a computer when the user runs the infected file.

virus

spyware

ransomware

worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is a particular form of malware that secretly collects various types of personal information. It is known as a key logger.

Spyware

virus

malware

worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ is a process in which hackers pretend to be a trusted contact,

and trick Internet users into sending sensitive information, such as

credit card numbers or e-mail passwords.

Phishing

Pharming

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?