Security Risks

Security Risks

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

cyber safety

cyber safety

9th Grade

11 Qs

Cyber Security Quiz

Cyber Security Quiz

11th Grade

13 Qs

AP Computer Science Unit 10

AP Computer Science Unit 10

9th - 12th Grade

12 Qs

Network Security

Network Security

9th Grade

13 Qs

Network security

Network security

8th - 9th Grade

10 Qs

18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

9th - 12th Grade

11 Qs

Internet Security

Internet Security

9th Grade

10 Qs

Malware and Attack Technologies

Malware and Attack Technologies

9th - 12th Grade

12 Qs

Security Risks

Security Risks

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Maria Cruz Farooqi

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

Phishing

Virus

Malware

Rogue Access Point

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A program that can copy itself and gain access to a computer in an unauthorized way.

Phishing

Keylogger

Malware

Virus

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Freeware or shareware can be trusted to be free of all malware.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malicious links can show up in an email message.

True

False

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Use of a program to record every keystroke made by a computer user, in order to gain fraudulent access.

Keylogging

Rogue Access Point

Phishing

Malware

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A technique used to trick a user into providing personal information.

Keylogging

Virus

Phishing

Malware

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Data sent over public networks can be intercepted, analyzed and modified. One way this can happen is through...

Rogue Access Point

Keylogging

Phishing

Permissions

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Unsolicited emails, attachments, and links in emails can not be used to compromise the security of a computing system.

True

False