Vocabulary Words Cyber Fundamentals

Vocabulary Words Cyber Fundamentals

10th Grade

39 Qs

quiz-placeholder

Similar activities

AP Computer Science Principles Practice

AP Computer Science Principles Practice

10th Grade

40 Qs

IGCSE ICT Chapter 8 - Safety & Security

IGCSE ICT Chapter 8 - Safety & Security

9th - 10th Grade

35 Qs

2019 Review - III, IGCSE CS 0478 - dfm

2019 Review - III, IGCSE CS 0478 - dfm

9th - 12th Grade

42 Qs

Security Ethics V2.0

Security Ethics V2.0

10th Grade

41 Qs

GCSE (9–1) CS 1.3 Networks, connections & protocols

GCSE (9–1) CS 1.3 Networks, connections & protocols

9th - 11th Grade

40 Qs

CompTIA Fundamentals Topic 1

CompTIA Fundamentals Topic 1

10th - 12th Grade

36 Qs

Cyber Security CIW

Cyber Security CIW

9th - 12th Grade

38 Qs

Grade 10 Term 3 Final Exam

Grade 10 Term 3 Final Exam

10th Grade

40 Qs

Vocabulary Words Cyber Fundamentals

Vocabulary Words Cyber Fundamentals

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Dorothy Hill

Used 6+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technique that involves sending fraudulent text messages?

A) Smishing

B) Whaling

C) Pharming

D) Pretexting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Whaling targets which group of individuals?

General public

High-profile individuals

Children

Elderly

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Watering hole attack?

A) Infecting a website to target its visitors

B) A type of email scam

C) A method to steal passwords

D) A physical break-in

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for inexperienced individuals who use existing computer scripts or codes to hack into computers?

Script Kiddies

Cyber Experts

Hacktivists

Cyber Warriors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'Malware' refer to?

A) A type of software designed to protect computers

B) A type of software designed to harm computers

C) A type of hardware used in computers

D) A type of network protocol.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of hackers?

To create software

To gain unauthorized access to data

To design websites

To repair computers.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: PII is crucial for protecting ______.

public data

personal privacy

network speed

software updates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?