WJEC CS U1 Cybersecurity

WJEC CS U1 Cybersecurity

2nd Grade

20 Qs

quiz-placeholder

Similar activities

FOOD

FOOD

2nd Grade

24 Qs

LOT3 Team Building Quiz

LOT3 Team Building Quiz

1st - 2nd Grade

15 Qs

DYK

DYK

2nd Grade

20 Qs

EA Newswire 2022-05-13

EA Newswire 2022-05-13

1st - 12th Grade

18 Qs

Josephs testimony and story

Josephs testimony and story

2nd Grade

20 Qs

Christmas Quiz

Christmas Quiz

1st - 12th Grade

20 Qs

My life

My life

KG - 12th Grade

15 Qs

Communism vs Capatilism

Communism vs Capatilism

KG - Professional Development

20 Qs

WJEC CS U1 Cybersecurity

WJEC CS U1 Cybersecurity

Assessment

Quiz

Fun

2nd Grade

Practice Problem

Medium

Created by

Jonathan Thomas

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software designed to protect a network

Software created to harm or exploit systems

Hardware that prevents unauthorised access

Software that monitors network traffic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a virus most likely to do?

Encrypt files and demand payment

Reduce system performance

Monitor user activity secretly

Pretend to be useful software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware locks a user’s files until money is paid?

Worm

Spyware

Trojan Horse

Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes a worm different from a virus?

Worms require a host file to spread

Worms can replicate and spread without a host program

Worms are not harmful to systems

Worms only infect removable drives

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware secretly collects user data such as keystrokes?

Spyware

Trojan horse

Rootkit

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Sending fake messages to trick users into sharing information

Cracking passwords through repeated guessing

Blocking access to a website

Copying a database illegally

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker phones an employee pretending to be IT support and requests login details. Which social-engineering method is this?

Phishing

Pretexting

Baiting

Impersonation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?