
Multiple Choice Questions
Authored by Reynard Abendan
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
During a confidential meeting, a government discovers its classified communications have been intercepted and transmitted to a foreign agency.
Cyber Espionage
Cyber Terrorism
Net Extortion
Cyber Fraud
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Hackers coordinated a massive attack on national power systems to cause panic and disrupt economic activity. This act best illustrates _______.
Cyber Terrorism
Cyber Espionage
Virus Dissemination
Cyber Fraud
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
By flooding a company’s web server with millions of fake access requests, attackers make the website inaccessible to real customers. The crime is called a _______.
Trojan Horse
Denial of Service (DoS) Attack
Phishing Scam
Cyber Espionage
4.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Hidden code within a legitimate application secretly gives hackers administrator access to a user’s system. This is an example of a _______.
Rootkit
Worm
Virus
Trojan Horse
5.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Multiple infected computers worldwide are remotely commanded to attack a government website at the same time. What kind of attack does this describe?
Distributed Denial of Service (DDoS)
Worm Propagation
Cyber Espionage
Spoofing
6.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
A university’s entire grading system is compromised due to unpatched vulnerabilities in its old database software. Which preventive measure could have avoided this?
Regular System Updates
Two-Factor Authentication
Antivirus Installation
Data Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
A university’s entire grading system is compromised due to unpatched vulnerabilities in its old database software. Which preventive measure could have avoided this?
Regular System Updates
Two-Factor Authentication
Antivirus Installation
Data Encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?