Search Header Logo

Multiple Choice Questions

Authored by Reynard Abendan

Computers

Professional Development

Used 3+ times

 Multiple Choice Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

During a confidential meeting, a government discovers its classified communications have been intercepted and transmitted to a foreign agency.

Cyber Espionage

Cyber Terrorism

Net Extortion

Cyber Fraud

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Hackers coordinated a massive attack on national power systems to cause panic and disrupt economic activity. This act best illustrates _______.

Cyber Terrorism

Cyber Espionage

Virus Dissemination

Cyber Fraud

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

By flooding a company’s web server with millions of fake access requests, attackers make the website inaccessible to real customers. The crime is called a _______.

Trojan Horse

Denial of Service (DoS) Attack

Phishing Scam

Cyber Espionage

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Hidden code within a legitimate application secretly gives hackers administrator access to a user’s system. This is an example of a _______.

Rootkit

Worm

Virus

Trojan Horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Multiple infected computers worldwide are remotely commanded to attack a government website at the same time. What kind of attack does this describe?

Distributed Denial of Service (DDoS)

Worm Propagation

Cyber Espionage

Spoofing

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A university’s entire grading system is compromised due to unpatched vulnerabilities in its old database software. Which preventive measure could have avoided this?

Regular System Updates

Two-Factor Authentication

Antivirus Installation

Data Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A university’s entire grading system is compromised due to unpatched vulnerabilities in its old database software. Which preventive measure could have avoided this?

Regular System Updates

Two-Factor Authentication

Antivirus Installation

Data Encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?