SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS

SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS

University

16 Qs

quiz-placeholder

Similar activities

Cuestionario sobre Ciberseguridad

Cuestionario sobre Ciberseguridad

11th Grade - University

16 Qs

Introduction to Computers

Introduction to Computers

University

20 Qs

ILP - Periodismo - UNLP

ILP - Periodismo - UNLP

University

14 Qs

ConquisRenacer-Internet#Final

ConquisRenacer-Internet#Final

6th Grade - Professional Development

17 Qs

Machine Learning Internship Quiz

Machine Learning Internship Quiz

University

15 Qs

BCS Network Security Test 2

BCS Network Security Test 2

University - Professional Development

18 Qs

Cloud Computing

Cloud Computing

University

12 Qs

Cuestionario sobre Seguridad de la Red

Cuestionario sobre Seguridad de la Red

University

12 Qs

SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS

SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS

Assessment

Quiz

Instructional Technology

University

Easy

Created by

joseph cortez

Used 7+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a self-replicating malware program that can spread across networks and systems without user intervention, often causing harm by consuming resources or carrying out malicious actions.

Trojan Horse

Worm

DDos

Rootkit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the use of deliberate and large-scale cyberattacks, often by politically motivated individuals or groups, to create fear, disrupt critical infrastructure, or cause harm to a nation or its population through digital means.

Smishing

Email Spam

Vishing

Cyberterrorism

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Vishing

Phishing

Rootkit

Email Spam

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

is a type of malware that disguises itself as a legitimate program or file to deceive users and gain unauthorized access to their systems, often with malicious intent.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

malware strain that typically infects a victim's computer through deceptive email attachments or malicious downloads, and it is designed to steal sensitive information, such as login credentials and financial data, by recording keystrokes and capturing screen images.

Zues

Zeus

sbot

Poseidon

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a social engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information, or sending money to cybercriminals.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a networking device that connects multiple networks together and forwards data packets from one network to another

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?