Digital Info Tech - Additional Terms for Final

Digital Info Tech - Additional Terms for Final

10th Grade

21 Qs

quiz-placeholder

Similar activities

Digital Ethics and AI Awareness

Digital Ethics and AI Awareness

7th Grade - University

20 Qs

Disaster Recovering Policy

Disaster Recovering Policy

10th Grade

21 Qs

Bezpieczeństwo w sieci dla uczniów

Bezpieczeństwo w sieci dla uczniów

6th Grade - University

20 Qs

Kuis Keamanan Data dan Informasi

Kuis Keamanan Data dan Informasi

9th Grade - University

25 Qs

DPK Elemen 5 Bacaan

DPK Elemen 5 Bacaan

10th Grade

20 Qs

DPK Elemen 7 Bacaan

DPK Elemen 7 Bacaan

10th Grade

20 Qs

Danger online

Danger online

7th Grade - University

25 Qs

Cybercrime exercise

Cybercrime exercise

7th Grade - University

23 Qs

Digital Info Tech - Additional Terms for Final

Digital Info Tech - Additional Terms for Final

Assessment

Quiz

Information Technology (IT)

10th Grade

Medium

Created by

Joanne Lowman

Used 1+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Code converting plain, readable text into non-readable text to keep data safe from hackers.

Cipher

Compiler

Debugger

Protocol

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The possibility of malicious attempts to damage data, steal data, disrupt digital life in general or disrupting a computer network.

Cyber Threat

Data Encryption

Cloud Computing

Network Protocol

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The virtual computer world and the online world of computer networks and especially the internet.

Cyberspace

Mainframe

Spreadsheet

Algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The practice of sending emails that appear to be from trusted sources with the goal of gaining personal information or influencing users to do something specific like click on a link that contains malware or go to a fake website.

Phishing Attacks

Brute Force Attacks

Denial of Service

Keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A phishing attack targeted to a specific person or persons.

Spear Phishing Attack

Whaling Attack

Vishing Attack

Pharming Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

In a phishing attack, information in the “From” section is falsified, making it appear as it is coming from someone you know.

Email Spoofing

Email Encryption

Email Forwarding

Email Archiving

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Copy legitimate websites to fool you into entering personally identifiable information or login credentials.

Website Cloning

Keylogging

Ransomware

Pharming

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?