Safety and Security

Safety and Security

8th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

10-29 Digital Citizenship-Malware TOD Quiz

10-29 Digital Citizenship-Malware TOD Quiz

6th - 8th Grade

7 Qs

Malware

Malware

6th - 8th Grade

10 Qs

Malware Introduction

Malware Introduction

5th - 10th Grade

10 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Malware Quiz

Malware Quiz

8th - 12th Grade

6 Qs

Cybercrime and Malware

Cybercrime and Malware

6th - 8th Grade

10 Qs

Rise of the bots | Exit Quiz | Oak National Academy

Rise of the bots | Exit Quiz | Oak National Academy

8th Grade - University

5 Qs

Safety and Security

Safety and Security

Assessment

Quiz

Computers, Education

8th Grade

Medium

Created by

Aubrey R

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one matches the description Trojan?

Malicious software that misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it.

Trojan

A broad term that refers to a variety of malicious programs, such as adware, bots, bugs, rootkits, spyware, Trojan horses, viruses, and worms.

Malware

Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.

Spyware

An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most secure password?

1234ABCD

pa$$w0rd

Love-U

8675309

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best description of Malware?

Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.

A broad term that refers to a variety of malicious programs, such as adware, bots, bugs, rootkits, spyware, Trojan horses, viruses, and worms.

An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.

Phishing

A malicious computer program self-replicates by copying itself to another program.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best description of Spyware?

Locks your computer until a sum of money is paid.

Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.

An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.

Malicious software that misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best description of Ransomeware?

Locks your computer until a sum of money is paid.

An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.

Is installed on a computer without the knowledge of the owner in order to collect the owner's private information

A broad term that refers to a variety of malicious programs, such as adware, bots, bugs, rootkits, spyware, Trojan horses, viruses, and worms.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best description of the term "virus"?

An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.

Phishing

Locks your computer until a sum of money is paid.

A broad term that refers to a variety of malicious programs, such as adware, bots, bugs, rootkits, spyware, Trojan horses, viruses, and worms.

None of these

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best description for phishing?

Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.

An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.

Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.

Malicious software that misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?