Vocabulary Words Cyber Fundamentals

Vocabulary Words Cyber Fundamentals

10th Grade

39 Qs

quiz-placeholder

Similar activities

OCR Cambridge National ICT LO3

OCR Cambridge National ICT LO3

KG - Professional Development

34 Qs

Security

Security

10th Grade

36 Qs

GCSE (9–1) CS 1.3 Networks, connections & protocols

GCSE (9–1) CS 1.3 Networks, connections & protocols

9th - 11th Grade

40 Qs

IT Bridge Vocabulary

IT Bridge Vocabulary

6th - 12th Grade

35 Qs

CompTIA Fundamentals Topic 1

CompTIA Fundamentals Topic 1

10th - 12th Grade

36 Qs

IGCSE ICT Safety and Security

IGCSE ICT Safety and Security

9th - 10th Grade

37 Qs

OCR J277 GCSE Paper 1 Recap

OCR J277 GCSE Paper 1 Recap

9th Grade - University

35 Qs

Summative Test - Network Security

Summative Test - Network Security

10th Grade

40 Qs

Vocabulary Words Cyber Fundamentals

Vocabulary Words Cyber Fundamentals

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Dorothy Hill

Used 6+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technique that involves sending fraudulent text messages?

A) Smishing

B) Whaling

C) Pharming

D) Pretexting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Whaling targets which group of individuals?

General public

High-profile individuals

Children

Elderly

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Watering hole attack?

A) Infecting a website to target its visitors

B) A type of email scam

C) A method to steal passwords

D) A physical break-in

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for inexperienced individuals who use existing computer scripts or codes to hack into computers?

Script Kiddies

Cyber Experts

Hacktivists

Cyber Warriors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'Malware' refer to?

A) A type of software designed to protect computers

B) A type of software designed to harm computers

C) A type of hardware used in computers

D) A type of network protocol.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of hackers?

To create software

To gain unauthorized access to data

To design websites

To repair computers.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: PII is crucial for protecting ______.

public data

personal privacy

network speed

software updates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?