Cyber Security Threats

Cyber Security Threats

10th Grade

15 Qs

quiz-placeholder

Similar activities

Паскаль. Основные команды

Паскаль. Основные команды

8th - 11th Grade

10 Qs

ICT Computer Basics pt1

ICT Computer Basics pt1

10th - 12th Grade

12 Qs

J808 LO1 and LO2 planning project keywords / terms

J808 LO1 and LO2 planning project keywords / terms

9th - 11th Grade

15 Qs

Email Lớp 6

Email Lớp 6

6th Grade - University

17 Qs

UH 1 BTIK

UH 1 BTIK

10th Grade

15 Qs

Network Quiz TH

Network Quiz TH

1st - 10th Grade

16 Qs

Ethical and Social Issues in ICT

Ethical and Social Issues in ICT

10th Grade

15 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

Cyber Security Threats

Cyber Security Threats

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

O Hawkridge

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A standalone malware computer program replicates itself to spread to other computers. Often, it uses a computer network to spread, relying on security failures on the target computer for access.

Malicious Code

Computer Worm

Anti Virus Software

Computer Virus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is software?

Viruses on your computer

Programs used by a computer

Documents used to type information

Harmful information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does malware get onto your computer?

Email attachments or links

By visiting dodgy websites

On USB sticks

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is designed to disrupt your device's proper functioning and sometimes to steal your information.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a type of malware?

Virus

Worm

Trojan horse

Phishing

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the ways an operating system can enhance system security? (PICK 3)

By offering the use of password protection

By providing different levels of user access

By keeping the software updated

Through disk defragmentation

Through the use of virtual memory

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are examples of social engineering? (PICK 2)

Phishing

Disguising oneself as an employee to gain access to computer systems

Sending an email with an attached virus that you created

Using brute force to access a system

Calling someone while pretending to be IT support to steal confidential data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?