Network Security
Quiz
•
Computers
•
9th Grade
•
Medium
Dave Gwilt
Used 352+ times
FREE Resource
Enhance your content
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and spread itself without human interaction.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can appear harmless but is in fact malicious and can install a backdoor into your system?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can encrypt your files and then require a payment to decrypt them.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and typically corrupts or deletes files. It is usually triggered by running an infected program.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can record the keys that you type at the keyboard and sends them to a 3rd party?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Phishing?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Pharming?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
18 questions
WJEC GCSE Computer Science - Security
Quiz
•
9th - 10th Grade
10 questions
Y8 Computer crime 2
Quiz
•
7th - 9th Grade
10 questions
AP Computer Science Principles - Unit 10: Cybersecurity
Quiz
•
9th - 12th Grade
14 questions
Malware And Hackers
Quiz
•
KG - University
14 questions
cyber security
Quiz
•
KG - Professional Dev...
10 questions
Digital Security
Quiz
•
9th - 12th Grade
10 questions
Cyber Security
Quiz
•
8th - 12th Grade
15 questions
IC3 GS6 Level 1 Domain 2 Lesson 1
Quiz
•
6th Grade - University
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)
Quiz
•
9th Grade
15 questions
MLA Formatting
Quiz
•
9th Grade
20 questions
Typing Practice
Quiz
•
7th - 12th Grade
14 questions
Inputs and Outputs: Computer Science Intro
Lesson
•
5th - 9th Grade
20 questions
Google Sheets Quiz
Quiz
•
9th Grade