WJEC CS U1 Cybersecurity

WJEC CS U1 Cybersecurity

2nd Grade

20 Qs

quiz-placeholder

Similar activities

Sports fun

Sports fun

3rd - 4th Grade

18 Qs

Quiz for Girls

Quiz for Girls

5th Grade

16 Qs

Team Trivia

Team Trivia

5th - 6th Grade

19 Qs

Christmas time

Christmas time

4th - 6th Grade

19 Qs

Świąteczny test wiedzy

Świąteczny test wiedzy

University - Professional Development

15 Qs

GEMATMW - Cryptography

GEMATMW - Cryptography

University - Professional Development

16 Qs

Palm Tree

Palm Tree

10th - 11th Grade

20 Qs

WJEC CS U1 Cybersecurity

WJEC CS U1 Cybersecurity

Assessment

Quiz

Fun

2nd Grade

Practice Problem

Medium

Created by

Jonathan Thomas

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software designed to protect a network

Software created to harm or exploit systems

Hardware that prevents unauthorised access

Software that monitors network traffic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a virus most likely to do?

Encrypt files and demand payment

Reduce system performance

Monitor user activity secretly

Pretend to be useful software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware locks a user’s files until money is paid?

Worm

Spyware

Trojan Horse

Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes a worm different from a virus?

Worms require a host file to spread

Worms can replicate and spread without a host program

Worms are not harmful to systems

Worms only infect removable drives

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware secretly collects user data such as keystrokes?

Spyware

Trojan horse

Rootkit

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Sending fake messages to trick users into sharing information

Cracking passwords through repeated guessing

Blocking access to a website

Copying a database illegally

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker phones an employee pretending to be IT support and requests login details. Which social-engineering method is this?

Phishing

Pretexting

Baiting

Impersonation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?