
Cyber Security - Learning Tales
Other
Professional Development
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
How does malware get onto your computer?
Email attachments or links
On USB sticks
By visiting insecure websites
All the options
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following is an example of a “phishing” attack?
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.
Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information.
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.
All of the above.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
Antivirus
Firewall
Vlc player
Script
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is considered as the unsolicited commercial email?
Virus
Malware
Spam
All of the above
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
As a security manager, how would you explain the primary goal of a security awareness program to senior management? (Information Security & Risk Management Domain)
Provide a vehicle for communicating security procedures
Provide a clear understanding of potential risk and exposure
Provide a forum for disclosing exposure and risk analysis
Provide a forum to communicate user responsibilities
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
________________ is the process of recovering passwords from data that have been stored in or transmitted by a computer system ?
Network cracking
Password cracking
System cracking
Phishing
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of this is an example of physical hacking?
Remote Unauthorised access
Inserting malware loaded USB to a system
SQL Injection on SQL vulnerable site
DDoS (Distributed Denial of Service) attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Selling Skills
Quiz
•
Professional Development
13 questions
Anime 99
Quiz
•
9th Grade - Professio...
10 questions
Infancy
Quiz
•
4th Grade - Professio...
12 questions
Week 16 - Primary Survey Recap
Quiz
•
University - Professi...
9 questions
Approach Control Equipment & Procedures
Quiz
•
Professional Development
10 questions
GAIA - TRIVIA QUIZ 1
Quiz
•
Professional Development
10 questions
Formación Humana
Quiz
•
Professional Development
10 questions
Cuestionario TDA
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Other
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development