Chapter 1: Networks and the internet

Chapter 1: Networks and the internet

9th - 11th Grade

7 Qs

quiz-placeholder

Similar activities

Q3 M3 POST TEST

Q3 M3 POST TEST

10th Grade

10 Qs

Proyecto integrador 7A

Proyecto integrador 7A

7th - 9th Grade

10 Qs

Internet security

Internet security

11th - 12th Grade

10 Qs

J808 LO4.1.2 Malware

J808 LO4.1.2 Malware

10th - 11th Grade

12 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Internet threats

Internet threats

11th Grade

10 Qs

Tipos de Virus

Tipos de Virus

10th Grade

11 Qs

OCR Malware CS

OCR Malware CS

KG - 10th Grade

7 Qs

Chapter 1: Networks and the internet

Chapter 1: Networks and the internet

Assessment

Quiz

Computers

9th - 11th Grade

Hard

Created by

Marks Simon

Used 19+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Media Image

Maryam joined as a business analyst in Alpha Delta IT solutions company. She needs to create a business email address that uses the company's domain name. Help Maryam by giving her five password suggestions for her new email account that cybercriminals find challenging to invade. Follow the tips given below for your suggestions:

1•Do not use your full name, address or phone number.

2•Do not use your email username

3•Do not use the same username and password combination as other accounts you may have.

4•Do not choose an odd username and then reuse it again.

5•Do not choose a password that can be guessed from your username.

m@Dxb13579

Fj43jtj345

123Maryam

Hello123

2.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Media Image

Identify the malware used in the following cyberattacks.

1.Malware designed to track online activity and capture data

Ransomware

Virus

Adware

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

Identify the malware used in the following cyberattacks

Software that automatically delivers advertisements

Ransomware

Adware

Virus

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

 

Identify the malware used in the following cyberattacks

Malware that holds a computer system captive until payment is made to the attacker

Ransomware

spyware

Worms

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

Identify the malware used in the following cyberattacks

Malicious code that replicates itself independently by exploiting vulnerabilities in networks

Virus

Worms

Ransomware

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

Identify the malware used in the following cyberattacks

malware gains unauthorized access to a system by bypassing the normal authentication procedures.

Backdoor

Ransomware

Virus

Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Media Image

Identify the malware used in the following cyberattacks.

malware that is designed to modify the operating system and give attackers access to remote resources

Backdoor

Worm

Ransomware

Rootkit