
Unit 11 Cyber Security Threats
Authored by Jerry Jackson Bent
Computers
1st - 12th Grade
Used 22+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is PHISHING?
Where a device is used to intercept packets of data as they are transferred across a network.
Where an executable file is secretly installed to record each key pressed and send
Writing a snippet of code to try and retrieve data from a machine
Sending emails pretending to be from reputable companies to try and get people to reveal personal information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a DDOS Attack?
Denial of System Attack
Deliberate Denial of System Attack
Denial of Service Attack
Distributed Denial of Service Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the most common methods used by cyber criminals? Used because people are generally trusting of others and this makes them a weak link where network security is concerned.
Viral Engineering
Social Engineering
Malware
Adware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call it when emails are disguised to look like they are from a trusted company, in order to gain access to confidential information.
Malware
Social Engineering
Phishing
Brute Force Attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Virus, worm, trojan, ransomware, spyware are all examples of what?
Advertising tools
Malware
Viruses
Infections
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rose just installed a new search engine on her laptop.now whenever she searches the internet, she gets several pop-up windows directing her to buy products.what does rose have?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
IT security recently found a program on your co-worker's computer that apparently tracked all of the words that they typed into the computer. what kind of malware is this?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?