Internet Safety Quiz

Internet Safety Quiz

11th Grade

20 Qs

quiz-placeholder

Similar activities

6-sinfl. Ofis dasturlari va Scratch

6-sinfl. Ofis dasturlari va Scratch

6th Grade - University

15 Qs

Pengelolaan Folder dan Antarmuka Pengguna

Pengelolaan Folder dan Antarmuka Pengguna

7th Grade - University

20 Qs

Quiz Perkembangan Komputer

Quiz Perkembangan Komputer

11th Grade

20 Qs

5-sinf. Kompyuter va Internet Asoslari

5-sinf. Kompyuter va Internet Asoslari

5th Grade - University

15 Qs

Latihan Soal Informatika

Latihan Soal Informatika

8th Grade - University

17 Qs

Teknologi Jaringan Berbasis Luas (WAN)

Teknologi Jaringan Berbasis Luas (WAN)

11th Grade

20 Qs

Algoritma Pemrograman

Algoritma Pemrograman

10th Grade - University

20 Qs

BAB 6 ANALISIS DATA B. Perkakas Pengolah Lembar Kerja

BAB 6 ANALISIS DATA B. Perkakas Pengolah Lembar Kerja

7th Grade - University

20 Qs

Internet Safety Quiz

Internet Safety Quiz

Assessment

Quiz

Information Technology (IT)

11th Grade

Practice Problem

Medium

Created by

chrisbenedict sevilleno

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why should passwords be treated like a toothbrush?

They should be replaced on a regular schedule to prevent buildup.

They should be uniquely refreshed periodically to avoid predictability.

They should remain strictly personal and never be shared.

They should be updated often and kept securely in a private space.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Logging into public Wi‑Fi is risky because:

It can lead to unusual device strain and potential overheating risks.

It can allow cyber intruders to capture unprotected data transmissions.

It can trigger unauthorized software installations without your consent.

It can prompt inadvertent sharing of login credentials with unknown users.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pharming differs from phishing because it:

Necessitates user engagement by clicking on deceptive links.

Automatically reroutes users to counterfeit websites without a direct click.

Selectively exploits specific platforms rather than using broad email prompts.

Employs alternative contact methods, such as phone calls, to divert users.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Adware primarily affects users by:

Compromising files by encrypting them and soliciting a ransom.

Bombarding browsers with persistent, intrusive pop‑up advertisements.

Propagating spam emails indiscriminately to all contacts.

Disrupting system integrity by removing or corrupting critical files.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Trojan is dangerous because it:

Self‑replicates by infecting adjacent files and programs.

Camouflages itself as benign software to clandestinely access your system.

Primarily disseminates through email attachments, limiting its reach.

Impedes performance by significantly slowing down network connectivity.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware is more harmful than keyloggers because it:

Is limited to recording keystrokes, primarily focusing on passwords.

Infiltrates systems to access a broad range of data—including browsing history—and may impair system integrity.

Concentrates solely on exploiting vulnerabilities in public Wi‑Fi networks.

Initiates file encryption and ransom demands as its primary attack vector.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rogue security software tricks users by:

Misleading them with promises of complimentary antivirus upgrades.

Deceiving them through counterfeit virus alerts that promote worthless solutions.

Obstructing access to genuine websites under the guise of protection.

Exploiting user data by encrypting files and demanding unwarranted fees.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?