Security Risks

Security Risks

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

AP Computer Science Unit 10

AP Computer Science Unit 10

9th - 12th Grade

12 Qs

Network Security

Network Security

9th Grade

13 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

9th Grade

12 Qs

Y8 Computer crime 2

Y8 Computer crime 2

7th - 9th Grade

10 Qs

CSP 10-7 Security Risks

CSP 10-7 Security Risks

9th - 11th Grade

8 Qs

Security Risks

Security Risks

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Maria Cruz Farooqi

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

Phishing

Virus

Malware

Rogue Access Point

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A program that can copy itself and gain access to a computer in an unauthorized way.

Phishing

Keylogger

Malware

Virus

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Freeware or shareware can be trusted to be free of all malware.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malicious links can show up in an email message.

True

False

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Use of a program to record every keystroke made by a computer user, in order to gain fraudulent access.

Keylogging

Rogue Access Point

Phishing

Malware

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A technique used to trick a user into providing personal information.

Keylogging

Virus

Phishing

Malware

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Data sent over public networks can be intercepted, analyzed and modified. One way this can happen is through...

Rogue Access Point

Keylogging

Phishing

Permissions

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Unsolicited emails, attachments, and links in emails can not be used to compromise the security of a computing system.

True

False