Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Cyber Security Quiz

Cyber Security Quiz

10th Grade

20 Qs

Understanding Trojans in Computer Security

Understanding Trojans in Computer Security

12th Grade - University

17 Qs

Oli's ICT Quiz on Security and Malware!

Oli's ICT Quiz on Security and Malware!

10th - 11th Grade

15 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

QUIZ #3 LESSON 6: PEER-TO-PEER NETWORK & NETWORK SECURITY

QUIZ #3 LESSON 6: PEER-TO-PEER NETWORK & NETWORK SECURITY

10th Grade

20 Qs

Module 5 Test Review - Cengage Mindtap

Module 5 Test Review - Cengage Mindtap

9th - 12th Grade

20 Qs

 Cybersecurity

Cybersecurity

Assessment

Quiz

Computers, Other, Science

9th - 12th Grade

Medium

Created by

EUGENE SCHOECK

Used 63+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of changing plain text into ciphertext for the purpose of security or privacy?

Denial of Service

Encryption

Endpoint Protection Platform

Digital Signature

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

software that is designed to gain access to your computer with malicious intent. An umbrella term for all software that has malicious intent (viruses, worms, Trojans...)

malware

ransomware

adware

spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that encrypts programs and data until a ransom is paid to remove it.

malware

adware

ransomware

spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

unwanted software that monitors and gathers information on a person and how they use their computer

adware

ransomware

Trojan

spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of a phishing email?

The email contains poor spelling and grammar.

The email is from a government official.

The email is from a trusted source.

The email contains high-quality images.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term 'white hat hacker'?
Illegal hacker – intent on doing harm, stealing for personal gain e.g. taking credit card details.
Doesn’t necessarily steal but may access IT systems without permission which is still illegal.
Ethical hacker – paid by companies to test their systems fro vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by a 'black hat hacker'?
Doesn’t necessarily steal but may access IT systems without permission which is still illegal.
Illegal hacker – intent on doing harm, stealing for personal gain e.g. taking credit card details.
Ethical hacker – paid by companies to test their systems fro vulnerabilities.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?