Online Security Threats

Online Security Threats

7th - 11th Grade

8 Qs

quiz-placeholder

Similar activities

Y8 Computer crime 2

Y8 Computer crime 2

7th - 9th Grade

10 Qs

All About Email

All About Email

3rd - 8th Grade

10 Qs

Post Assessment - Cybersecurity Awareness

Post Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

Internet Security

Internet Security

3rd - 10th Grade

10 Qs

Identity Theft

Identity Theft

8th - 12th Grade

12 Qs

accessing Details (Akul Singhal 8A )

accessing Details (Akul Singhal 8A )

8th Grade

9 Qs

PRETEST INFORMATIKA-SISTEM KOMPUTER

PRETEST INFORMATIKA-SISTEM KOMPUTER

10th Grade

10 Qs

Online Security Threats

Online Security Threats

Assessment

Quiz

Computers

7th - 11th Grade

Hard

Created by

Jeff Beith

Used 31+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a type of online threat

Phishing

Keylogging

Antivirus

Worms

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What should you look for to see if an email is a phishing attack?

Generic greeting without your name

A web address that looks different than expected

The word virus

Everything being spelling correctly

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the software that monitors what you are typing?

Keytracker

Keyware

Keylogger

Typetracker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malicious software with the main goal of replicating and spreading itself?

Worm

Virus

Spyware

Trojan Horse

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the type of cyber attack that takes its name from Greek mythology?

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What can happen if someone knows your pet's name?

They can compliment your great choice of name

They can use it to answer a security question to access your account

They can use it to install spyware on your computer

They can use it to create ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of online threat can result in people taking out loans in your name?

Trojan Horse

Worm

Adware

Identity Theft

8.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What sort of companies are likely to be impersonated for a phishing attack?

Banks

Fish and chip shops

Butchers

Postal Services