
GEC9 - Internet Threats
Authored by Junice Ilagan
Computers
University
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Malicious Software
Malware
Worm
Virus
Phishing
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An unwanted email mostly from bots or advertisers.
Spyware
Spam
Virus
Malware
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Goal: acquiring sensitive personal information.
Spam
Spyware
Phishing
Malware
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
It is a program that runs in the background without you knowing.
Virus
Ransomware
Malware
Spyware
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
It threatens to publish the victim's data or perpetually block access to it unless something is paid.
Malware
Phishing
Ransomware
Spyware
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Malicious program that is disguised as a useful program. Once downloaded, it leaves your device unprotected.
Worm
Trojan
Spyware
Phishing
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Unauthorized access to a computer.
Hacking
Pharming
Phishing
Adware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?