Vocabulary Words Cyber Fundamentals

Vocabulary Words Cyber Fundamentals

10th Grade

39 Qs

quiz-placeholder

Similar activities

Computer Terms

Computer Terms

6th - 12th Grade

37 Qs

Computer Science first Quiz

Computer Science first Quiz

10th - 12th Grade

36 Qs

Unit 4 Review

Unit 4 Review

9th - 12th Grade

35 Qs

GCSE DT Unit 1 Definitions

GCSE DT Unit 1 Definitions

10th - 12th Grade

40 Qs

Computer Security and Virus Awareness

Computer Security and Virus Awareness

9th - 12th Grade

40 Qs

Windows 10 Configuration

Windows 10 Configuration

1st - 10th Grade

35 Qs

Socrathecs 2

Socrathecs 2

1st - 12th Grade

40 Qs

Computer Essentials

Computer Essentials

9th - 12th Grade

35 Qs

Vocabulary Words Cyber Fundamentals

Vocabulary Words Cyber Fundamentals

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Dorothy Hill

Used 6+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technique that involves sending fraudulent text messages?

A) Smishing

B) Whaling

C) Pharming

D) Pretexting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Whaling targets which group of individuals?

General public

High-profile individuals

Children

Elderly

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Watering hole attack?

A) Infecting a website to target its visitors

B) A type of email scam

C) A method to steal passwords

D) A physical break-in

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for inexperienced individuals who use existing computer scripts or codes to hack into computers?

Script Kiddies

Cyber Experts

Hacktivists

Cyber Warriors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'Malware' refer to?

A) A type of software designed to protect computers

B) A type of software designed to harm computers

C) A type of hardware used in computers

D) A type of network protocol.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of hackers?

To create software

To gain unauthorized access to data

To design websites

To repair computers.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: PII is crucial for protecting ______.

public data

personal privacy

network speed

software updates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?