
Multiple Choice Questions
Authored by Reynard Abendan
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
During a confidential meeting, a government discovers its classified communications have been intercepted and transmitted to a foreign agency.
Cyber Espionage
Cyber Terrorism
Net Extortion
Cyber Fraud
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Hackers coordinated a massive attack on national power systems to cause panic and disrupt economic activity. This act best illustrates _______.
Cyber Terrorism
Cyber Espionage
Virus Dissemination
Cyber Fraud
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
By flooding a company’s web server with millions of fake access requests, attackers make the website inaccessible to real customers. The crime is called a _______.
Trojan Horse
Denial of Service (DoS) Attack
Phishing Scam
Cyber Espionage
4.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Hidden code within a legitimate application secretly gives hackers administrator access to a user’s system. This is an example of a _______.
Rootkit
Worm
Virus
Trojan Horse
5.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Multiple infected computers worldwide are remotely commanded to attack a government website at the same time. What kind of attack does this describe?
Distributed Denial of Service (DDoS)
Worm Propagation
Cyber Espionage
Spoofing
6.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
A university’s entire grading system is compromised due to unpatched vulnerabilities in its old database software. Which preventive measure could have avoided this?
Regular System Updates
Two-Factor Authentication
Antivirus Installation
Data Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
A university’s entire grading system is compromised due to unpatched vulnerabilities in its old database software. Which preventive measure could have avoided this?
Regular System Updates
Two-Factor Authentication
Antivirus Installation
Data Encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
40 questions
QUIZZ KJD - PERAWATAN, PERMASALAHAN DAN PERBAIKAN PC
Quiz
•
KG - Professional Dev...
49 questions
Cuestionario - TEMA 7 (SOM). Sistema operativo Linux.
Quiz
•
KG - Professional Dev...
50 questions
UTK - drukarki , skanery , plotery
Quiz
•
1st Grade - Professio...
40 questions
Foundation_Batch_2025
Quiz
•
Professional Development
50 questions
CUESTIONARIO DE REPASO DE ANÁLISIS FORENSE
Quiz
•
Professional Development
40 questions
CFGB La placa base
Quiz
•
Professional Development
50 questions
XIRPL2_PASQUIZZ
Quiz
•
1st Grade - Professio...
40 questions
LPI Linux Essentials (40 Questions)
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...