WJEC CS U1 Cybersecurity

WJEC CS U1 Cybersecurity

2nd Grade

20 Qs

quiz-placeholder

Similar activities

Song and Movie Trivia

Song and Movie Trivia

KG - University

16 Qs

Christmas-Bible Quiz

Christmas-Bible Quiz

KG - Professional Development

15 Qs

General Information -August 26, 2022

General Information -August 26, 2022

2nd Grade

15 Qs

Anaruk

Anaruk

2nd - 3rd Grade

18 Qs

Jessie

Jessie

1st - 12th Grade

18 Qs

HP Oreo

HP Oreo

2nd - 8th Grade

23 Qs

Tangled

Tangled

KG - Professional Development

15 Qs

TRIVIA

TRIVIA

2nd - 12th Grade

20 Qs

WJEC CS U1 Cybersecurity

WJEC CS U1 Cybersecurity

Assessment

Quiz

Fun

2nd Grade

Practice Problem

Medium

Created by

Jonathan Thomas

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software designed to protect a network

Software created to harm or exploit systems

Hardware that prevents unauthorised access

Software that monitors network traffic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a virus most likely to do?

Encrypt files and demand payment

Reduce system performance

Monitor user activity secretly

Pretend to be useful software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware locks a user’s files until money is paid?

Worm

Spyware

Trojan Horse

Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes a worm different from a virus?

Worms require a host file to spread

Worms can replicate and spread without a host program

Worms are not harmful to systems

Worms only infect removable drives

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware secretly collects user data such as keystrokes?

Spyware

Trojan horse

Rootkit

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Sending fake messages to trick users into sharing information

Cracking passwords through repeated guessing

Blocking access to a website

Copying a database illegally

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker phones an employee pretending to be IT support and requests login details. Which social-engineering method is this?

Phishing

Pretexting

Baiting

Impersonation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?