Cybersecurity Chapter 3

Cybersecurity Chapter 3

11th Grade

9 Qs

quiz-placeholder

Similar activities

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

COMPUETR AND NETWORK

COMPUETR AND NETWORK

9th - 12th Grade

11 Qs

Empowerment Technologies 1st

Empowerment Technologies 1st

11th Grade

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

Identity Theft

Identity Theft

8th - 12th Grade

12 Qs

Cybersecurity Chapter 3

Cybersecurity Chapter 3

Assessment

Quiz

Computers

11th Grade

Hard

Created by

E Sheng Toh

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a rootkit modify?

Empty the browser cache.

Delete unused software.

Operating system.

Keep software up to date.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

SQL injection

Cross-site scripting

buffer overflow

XML injection

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two ways to protect a computer from malware? (Choose two.)

Delete unused software.

Use antivirus software.

Empty the browser cache.

Defragment the hard disk.

Keep software up to date.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

integrity

Impersonation

urgency

compassion

honesty

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type

this?

bluesnarfing

RF jamming

bluejacking

smishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

spear phishing

vishing

spyware

target phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

trackers

spyware

adware

pop-ups

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What occurs on a computer when data goes beyond the limits of a buffer?

an SQL injection

a system exception

cross-site scripting

a buffer overflow

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

adware

virus

spyware

phishing