Understanding Cybersecurity Threats

Understanding Cybersecurity Threats

7th Grade

9 Qs

quiz-placeholder

Similar activities

Татаал издөө сурамдары

Татаал издөө сурамдары

7th Grade - University

10 Qs

Computer Number System

Computer Number System

7th Grade

10 Qs

COMP7

COMP7

7th Grade

10 Qs

Tipos de Software

Tipos de Software

4th Grade - University

10 Qs

7ci siniflər

7ci siniflər

7th Grade

14 Qs

Planning Poker

Planning Poker

2nd Grade - University

12 Qs

Quiz DPK 1

Quiz DPK 1

1st Grade - University

10 Qs

Tipuri de structuri

Tipuri de structuri

6th - 8th Grade

10 Qs

Understanding Cybersecurity Threats

Understanding Cybersecurity Threats

Assessment

Quiz

Information Technology (IT)

7th Grade

Practice Problem

Easy

Created by

Steven Senjaya

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a phishing attack?

A phishing attack is a deceptive attempt to obtain sensitive information by masquerading as a trustworthy entity.

A phishing attack is a method of securing sensitive information.

A phishing attack is a type of malware that infects computers.

A phishing attack is a legitimate request for personal information from a bank.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How can you identify a phishing email?

Verify the email with a phone call to the sender

Check for suspicious sender addresses, generic greetings, urgent language, poor grammar, and unexpected attachments or links.

Ignore any emails that seem too good to be true

Look for personalized messages from known contacts

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is pharming and how does it work?

Pharming is a method of improving website performance.

Pharming is a type of medication used to treat allergies.

Pharming is a cyber attack that redirects users from legitimate websites to fraudulent ones.

Pharming refers to the process of creating new pharmaceuticals.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a worm differ from a virus?

A worm is self-replicating and spreads automatically, while a virus attaches to files and requires user action to spread.

A worm can only infect specific types of files, whereas a virus can infect any file type.

A worm is a type of virus that needs a host file to operate.

A worm requires user action to spread, while a virus spreads automatically.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan Horse in cybersecurity?

A Trojan Horse is a type of antivirus software that protects against malware.

A Trojan Horse is a physical device used to secure computer networks.

A Trojan Horse is a type of malware that pretends to be legitimate software to deceive users into installing it.

A Trojan Horse is a method of data encryption used to secure files.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware and what does it do?

Spyware is a tool used to improve internet speed.

Spyware is malicious software that collects user information without consent.

Spyware is a legitimate program that enhances computer performance.

Spyware is a type of antivirus software that protects user data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is adware and how can it affect your device?

Adware is a legitimate software that helps manage system updates.

Adware is a type of antivirus software that protects your device.

Adware is a tool that enhances device performance and speeds up internet browsing.

Adware is software that displays unwanted ads and can slow down your device, consume bandwidth, and compromise privacy.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware and what does it do to your files?

Ransomware deletes your files permanently.

Ransomware encrypts your files and demands a ransom for their release.

Ransomware slows down your computer without affecting files.

Ransomware creates backups of your files.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you protect yourself from malware attacks?

Click on any email link

Ignore all software updates

Regularly update software, use antivirus, avoid suspicious links, enable firewalls, and practice safe browsing.

Disable all security settings