Cybersecurty Concepts

Cybersecurty Concepts

University

10 Qs

quiz-placeholder

Similar activities

ESBrotherX_Medical AI_Lecture

ESBrotherX_Medical AI_Lecture

University

7 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Tin 8/1

Tin 8/1

KG - University

10 Qs

Assessment 08

Assessment 08

University

15 Qs

Prework Etapa 1 - Bogotá

Prework Etapa 1 - Bogotá

University

10 Qs

CID421 Introduction to 3D CAD SOLIDWORK

CID421 Introduction to 3D CAD SOLIDWORK

University

12 Qs

Python Basic Quiz

Python Basic Quiz

11th Grade - University

10 Qs

Cybersecurty Concepts

Cybersecurty Concepts

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Clara Rivera

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Cybersecurity, a threat agent is...

The entity that identifies a vulnerability and uses it to attack the victim. 

A computer criminal.

An organization of houseplants that use their photosynthetic powers to infiltrate devices.

The realisation of a stated threat.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Cybersecurity, an exploit is....

A software tool developed to take advantage of a vulnerability. 

 

A piece of software to to unethically take advantage of (a person, situation, etc), in the digital world.

A mystical spell cast by mischievous digital fairies to transform computers into tea-brewing robots.

The realization of a cyber threat.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Cybersecurity, countermeasures are...

Pieces of software used to launch cyber attacks.

Criminal actions or strategies from hackers.

Methods to detect and track hackers.

Techniques used to defend against attacks and to solve or compensate vulnerabilities. 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Cybersecurity, phishing is...

A technique to acquire sensitive information (eg login credentials or credit card data), by pretending to be a trustworthy organization

The activity of catching phish, either for food or as a sport.

A technique to generate forge copies of sensitive information to trick hackers.

A technique inspired in ancient methods whereby cyber pirates cast virtual fishing rods into the vast internet sea.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Cybersecurity, ransomware is...

A cryptovirological malware for identity theft.

A digital poltergeist that sneaks into computers and encrypts files.

A wide range of malicious programs such as virus or trojans.

A pieve of software designed to keep the user from their data and hold it hostage for payment.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Cybersecurity, spyware is....

Software to obtain hidden information in any computer.

Digital secret agent squirrels that hide in computers wearing a tiny trench coat and sunglasses.

Programs introduced through downloads to monitor operation and collect information such as passwords, credit card numbers, etc.

Cutting-edge technology that helps you locate lost items by scanning your digital environment.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Cybersecurity, adware is...

A program designed to introduce digital advertising you will not forget.

A program designed to introduce unwanted, unsolicited advertising displays to a web browser.

A mischievous digital parrot that perches on your browser's toolbar, constantly interrupting your online adventures with absurd sales pitches.

A set of pixelated pom-poms accompanied by slogans like "Buy, Buy, Buy!"

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?