WebXam Cram 1.23.23

WebXam Cram 1.23.23

12th Grade

20 Qs

quiz-placeholder

Similar activities

HSE LEGISLATION

HSE LEGISLATION

10th - 12th Grade

20 Qs

Bring Your A Game to Work:  Acceptance

Bring Your A Game to Work: Acceptance

12th Grade - University

16 Qs

employment issues in games

employment issues in games

12th Grade

18 Qs

Electude HVAC

Electude HVAC

10th - 12th Grade

15 Qs

Moini Ch13 Financial Managment

Moini Ch13 Financial Managment

11th Grade - University

25 Qs

Legal issues in Games

Legal issues in Games

12th Grade

15 Qs

Final Exam: Career Exploration

Final Exam: Career Exploration

12th Grade

20 Qs

WebXam Cram 1.23.23

WebXam Cram 1.23.23

Assessment

Quiz

Specialty

12th Grade

Medium

Created by

Susan Grasso

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of threat involves an individual with authorized access to a computer system using that access to harm the system or steal sensitive information?
A) Insider threat
B) Virus
C) Worm
D) Spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware disguises itself as a legitimate program in order to gain access to a computer system?
A) Virus
B) Worm
C) Spyware
D) Ransomware

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which type of cyber attack involves an attacker using social engineering techniques to trick a victim into giving away sensitive information or access to a computer system?
A) Spoofing
B) Hacking
C) Social engineering
D) Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyber attack involves an attacker sending an email or message to a victim pretending to be a legitimate source, in order to trick the victim into providing sensitive information or installing malware on their computer?
A) Spoofing
B) Hacking
C) Social engineering
D) Phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyber attack involves an attacker altering the configuration of a computer system or network in order to gain unauthorized access or control?
A) Spoofing
B) Hacking
C) Social engineering
D) Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware encrypts files on a victim's computer, making them inaccessible until a ransom is paid to the attacker?
A) Virus
B) Worm
C) Spyware
D) Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyber attack involves an attacker using a fake website or email address to trick a victim into providing sensitive information or login credentials?
A) Spoofing
B) Hacking
C) Social engineering
D) Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?