
Online Security Threats
Authored by Jeff Beith
Computers
7th - 11th Grade
Used 33+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a type of online threat
Phishing
Keylogging
Antivirus
Worms
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What should you look for to see if an email is a phishing attack?
Generic greeting without your name
A web address that looks different than expected
The word virus
Everything being spelling correctly
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name of the software that monitors what you are typing?
Keytracker
Keyware
Keylogger
Typetracker
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of malicious software with the main goal of replicating and spreading itself?
Worm
Virus
Spyware
Trojan Horse
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What is the type of cyber attack that takes its name from Greek mythology?
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What can happen if someone knows your pet's name?
They can compliment your great choice of name
They can use it to answer a security question to access your account
They can use it to install spyware on your computer
They can use it to create ransomware
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of online threat can result in people taking out loans in your name?
Trojan Horse
Worm
Adware
Identity Theft
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?