Cyber Aware Week 2

Cyber Aware Week 2

University

10 Qs

quiz-placeholder

Similar activities

Would you like Spam, Phish or Grits?

Would you like Spam, Phish or Grits?

5th Grade - University

10 Qs

Cyber Security QUIZ

Cyber Security QUIZ

University

10 Qs

CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

University

10 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Fraud

Fraud

KG - Professional Development

13 Qs

Digital Communication II

Digital Communication II

5th Grade - University

15 Qs

Information Security

Information Security

University

10 Qs

THE ULTIMATE KNOWLEDGE: Information techno_

THE ULTIMATE KNOWLEDGE: Information techno_

8th Grade - Professional Development

10 Qs

Cyber Aware Week 2

Cyber Aware Week 2

Assessment

Quiz

Computers

University

Easy

Created by

Alan Downes

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a type of malicious software designed to gain unauthorized access to a computer system?

Malware

Phishing

Social engineering

Encryption

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a distinguishing characteristic of a virus compared to other types of malware?

It spreads independently through networks

It encrypts files and demands payment for decryption

It requires user interaction to spread

It primarily targets mobile devices

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A worm differs from a virus in that it ...

Encrypts files on the infected system

Requires human intervention to spread

Spreads autonomously over networks

Masquerades as a legitimate software application

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Ransomware typically ...

Encrypts files and demands payment for decryption

Steals sensitive information and sells it on the black market

Deletes files and corrupts the operating system

Sends unsolicited emails containing malicious links or attachments

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a form of phishing that targets specific individuals or organizations, often using personalized information?

Smishing

Spear phishing

Ransomware

Botnet

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Social engineering relies on ...

Exploiting vulnerabilities in software code

Manipulating individuals into divulging confidential information

Encrypting sensitive data to prevent unauthorized access

Utilizing automated scripts to spread malware

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What term describes the unsolicited sending of large volumes of email, often containing advertisements or malicious content?

Spam

Bot

Encryption

Phishing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?