1.5.3 - Starter Tasks/Network Threats (Dg)

1.5.3 - Starter Tasks/Network Threats (Dg)

11th Grade

12 Qs

quiz-placeholder

Similar activities

สอบเก็บคะแนนบทที่ 2 เรื่อบภัยอันตรายของโลกอินเทอร์เน็ต

สอบเก็บคะแนนบทที่ 2 เรื่อบภัยอันตรายของโลกอินเทอร์เน็ต

11th Grade

16 Qs

Cybersecurity & Intellectual Property Review

Cybersecurity & Intellectual Property Review

9th - 12th Grade

17 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

SHS_Empowerment Technologies_MELC#2_QUIZ2

SHS_Empowerment Technologies_MELC#2_QUIZ2

11th - 12th Grade

10 Qs

Ethics and Safety measures in Computing

Ethics and Safety measures in Computing

6th - 12th Grade

10 Qs

AMENAZAS EN LA RED

AMENAZAS EN LA RED

11th Grade

7 Qs

Malware

Malware

11th Grade

15 Qs

Types of malware

Types of malware

10th - 11th Grade

13 Qs

1.5.3 - Starter Tasks/Network Threats (Dg)

1.5.3 - Starter Tasks/Network Threats (Dg)

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Mike Roberts

Used 105+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware will lock/encrypt files and will be returned if a fee is paid? (1 point)

Worm
Spyware
Ransomware
Trojan
Adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware self-replicates and copies itself from computer to computer? (1 point)

Adware
Spyware

Worm

Trojan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is often disguised as legitimate software for users to download? (1 point)

Trojan horse
Worm
Ransomware
Adware
Spyware

4.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Which social engineering technique refers to the act of obtaining personal or private information through direct observation? (2 points)

5.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Which social engineering technique involves a criminal making up a scenario in order to extract sensitive information? (2 points)

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Which social engineering technique is the act of an unwanted party going through the bin at a company whether it be inside or outside the building? (2 point)

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which network protocol is used to send messages? (3 points)

SMTP
TCP
HTTP
FTP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?