Malware, Social Engineering, and Data Interception Quiz

Malware, Social Engineering, and Data Interception Quiz

12th Grade

10 Qs

quiz-placeholder

Similar activities

CPU short

CPU short

9th - 12th Grade

10 Qs

History of computers

History of computers

7th - 12th Grade

15 Qs

Hands On 1: Parts of the Computer

Hands On 1: Parts of the Computer

1st Grade - University

10 Qs

Quiz 1

Quiz 1

1st - 12th Grade

15 Qs

Into to Comp Science: U2L2

Into to Comp Science: U2L2

8th - 12th Grade

9 Qs

4.1 Types of software

4.1 Types of software

9th Grade - University

15 Qs

Computational Thinking - AQA A Level Computer Science

Computational Thinking - AQA A Level Computer Science

10th Grade - University

10 Qs

Unit 1.5.MC Computer Input and Output

Unit 1.5.MC Computer Input and Output

12th Grade

14 Qs

Malware, Social Engineering, and Data Interception Quiz

Malware, Social Engineering, and Data Interception Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Mark Halfyard

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software that helps in data encryption

Software that enhances network security

Software that can be malicious and damaging to a computer or network

Software designed to improve computer functionality

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a worm?

ILOVEYOU

Trojan horse

Zeus

Mirai

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main method of spreading for a virus?

Exploiting vulnerabilities across the computer network

Seeking out other nodes and infecting them

Attaching itself to programs or files on a computer or server

Replicating itself to spread to other computers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a Trojan horse?

To seek out other nodes and infect them

To attach itself to programs or files on a computer or server

To replicate itself in order to spread to other computers

To access a computer by misleading users of its intent

5.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the most common method of phishing attacks?

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can data interception occur over a public wifi network?

By encrypting the packets

By using a firewall

By using a secure VPN

By setting up a 'Man in the Middle' attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the risk of data interception to individuals?

Theft of military secrets

Loss of intellectual property

Exposure of sensitive personal information

Disruption of government operations

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers