Cyber Security

Cyber Security

8th Grade

10 Qs

quiz-placeholder

Similar activities

Cyber Security Measures Yr8

Cyber Security Measures Yr8

7th - 9th Grade

10 Qs

Internet Terms

Internet Terms

6th - 8th Grade

10 Qs

iDEA | Cyber Spies & Internet & Web

iDEA | Cyber Spies & Internet & Web

6th - 8th Grade

10 Qs

9 A1L3 Progress Check

9 A1L3 Progress Check

8th Grade

10 Qs

Two-Factor Authentication Quiz

Two-Factor Authentication Quiz

8th Grade

12 Qs

Software - Functions of the Operating System

Software - Functions of the Operating System

5th - 12th Grade

9 Qs

LAN or WAN

LAN or WAN

7th - 8th Grade

12 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

8th Grade

Hard

Created by

PArvez Raza

Used 177+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

Adware

Spyware

Malware

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the

Antivirus

Cookies

Firewall

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Which one of the following usually used in the process of Wi-Fi-hacking?

Aircrack-ng

Wireshark

Norton

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4.In system hacking, which of the following is the most crucial activity?

Information gathering

Covering tracks

Cracking passwords

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5.Which one of the following is actually considered as the first computer virus?

Sasser

Blaster

Creeper

Both A and C

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6.Which of the following can be considered as the elements of cyber security?

Application Security

Operational Security

Network Security

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which of the following statements is true about the Trojans?

Trojans perform tasks for which they are designed or programmed

Trojans replicates them self's or clone them self's through an infections

Trojans do nothing harmful to the user's computer systems

None of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?