Search Header Logo

Understanding Cybersecurity Threats

Authored by Steven Senjaya

Information Technology (IT)

7th Grade

Used 2+ times

Understanding Cybersecurity Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a phishing attack?

A phishing attack is a deceptive attempt to obtain sensitive information by masquerading as a trustworthy entity.

A phishing attack is a method of securing sensitive information.

A phishing attack is a type of malware that infects computers.

A phishing attack is a legitimate request for personal information from a bank.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How can you identify a phishing email?

Verify the email with a phone call to the sender

Check for suspicious sender addresses, generic greetings, urgent language, poor grammar, and unexpected attachments or links.

Ignore any emails that seem too good to be true

Look for personalized messages from known contacts

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is pharming and how does it work?

Pharming is a method of improving website performance.

Pharming is a type of medication used to treat allergies.

Pharming is a cyber attack that redirects users from legitimate websites to fraudulent ones.

Pharming refers to the process of creating new pharmaceuticals.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a worm differ from a virus?

A worm is self-replicating and spreads automatically, while a virus attaches to files and requires user action to spread.

A worm can only infect specific types of files, whereas a virus can infect any file type.

A worm is a type of virus that needs a host file to operate.

A worm requires user action to spread, while a virus spreads automatically.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan Horse in cybersecurity?

A Trojan Horse is a type of antivirus software that protects against malware.

A Trojan Horse is a physical device used to secure computer networks.

A Trojan Horse is a type of malware that pretends to be legitimate software to deceive users into installing it.

A Trojan Horse is a method of data encryption used to secure files.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware and what does it do?

Spyware is a tool used to improve internet speed.

Spyware is malicious software that collects user information without consent.

Spyware is a legitimate program that enhances computer performance.

Spyware is a type of antivirus software that protects user data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is adware and how can it affect your device?

Adware is a legitimate software that helps manage system updates.

Adware is a type of antivirus software that protects your device.

Adware is a tool that enhances device performance and speeds up internet browsing.

Adware is software that displays unwanted ads and can slow down your device, consume bandwidth, and compromise privacy.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?