
Vocabulary Words Cyber Fundamentals
Authored by Dorothy Hill
Computers
10th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
39 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a technique that involves sending fraudulent text messages?
A) Smishing
B) Whaling
C) Pharming
D) Pretexting
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Whaling targets which group of individuals?
General public
High-profile individuals
Children
Elderly
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Watering hole attack?
A) Infecting a website to target its visitors
B) A type of email scam
C) A method to steal passwords
D) A physical break-in
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used for inexperienced individuals who use existing computer scripts or codes to hack into computers?
Script Kiddies
Cyber Experts
Hacktivists
Cyber Warriors
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term 'Malware' refer to?
A) A type of software designed to protect computers
B) A type of software designed to harm computers
C) A type of hardware used in computers
D) A type of network protocol.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of hackers?
To create software
To gain unauthorized access to data
To design websites
To repair computers.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Fill in the blank: PII is crucial for protecting ______.
public data
personal privacy
network speed
software updates
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?