Cyber Security and E Commerce

Cyber Security and E Commerce

10th - 12th Grade

47 Qs

quiz-placeholder

Similar activities

N5 Management of Marketing

N5 Management of Marketing

12th Grade

50 Qs

Regional	MIcro-Enterprise Credential

Regional MIcro-Enterprise Credential

11th - 12th Grade

50 Qs

Marketing Mix - Place - Comprehension

Marketing Mix - Place - Comprehension

10th Grade

50 Qs

Commerce

Commerce

11th Grade

51 Qs

2nd Bock Computer Science2024

2nd Bock Computer Science2024

12th Grade

42 Qs

CW Y10 Opt 1,2

CW Y10 Opt 1,2

10th Grade

42 Qs

Computer Technical Vocab and Port Vocab

Computer Technical Vocab and Port Vocab

9th - 12th Grade

46 Qs

The Web

The Web

9th - 12th Grade

43 Qs

Cyber Security and E Commerce

Cyber Security and E Commerce

Assessment

Quiz

Business

10th - 12th Grade

Hard

Created by

Carmen James

Used 20+ times

FREE Resource

47 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Antivirus protects you from all attacks

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

Malicious Code

Computer Worm

Anti Virus Software

Computer Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is the type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.

Computer Virus

Computer Worm

MyDoom

Malicious Code

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does malware get onto your computer?
Email attachments or links
By visiting dodgy websites
On USB sticks
All of the above

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of these are common methods that could be used to infect a computer with malware?

spam email

out of date firewall

Distributed denial of service

bookmarking a page

variable computer synchroniser

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which apply to phishing?

The art of catching aquatic animals with a rod

Using a malicious medium, disguised as a trustworthy source, to get users to reveal personal information

Physically threatening someone until they give up personal data

Personally hacking someone to get personal information

Usually an attack made via email

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are ways that an operating system can increase system security?

Offering the use of password protection

Different levels of user access

Keeping software updated

Disk Defragmentation

The use of virtual memory

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?