Etech Q3 module 2

Etech Q3 module 2

12th Grade

15 Qs

quiz-placeholder

Similar activities

Chapter 10 Cyber Security 14q

Chapter 10 Cyber Security 14q

9th - 12th Grade

14 Qs

Cyber Security

Cyber Security

12th Grade

10 Qs

Përdorimi i sigurt i internetit. Platforma eTwinning

Përdorimi i sigurt i internetit. Platforma eTwinning

5th - 12th Grade

15 Qs

CPA 4NT Paper 1 Quiz 1

CPA 4NT Paper 1 Quiz 1

10th - 12th Grade

20 Qs

เทคโนโลยีสารสนเทศอย่างปลอดภัย (ว 4.2 ม.6/1)

เทคโนโลยีสารสนเทศอย่างปลอดภัย (ว 4.2 ม.6/1)

12th Grade

10 Qs

HACKER'S

HACKER'S

12th Grade

11 Qs

Cuestionario sobre Ciberseguridad

Cuestionario sobre Ciberseguridad

11th Grade - University

16 Qs

E-mail

E-mail

5th - 12th Grade

17 Qs

Etech Q3 module 2

Etech Q3 module 2

Assessment

Quiz

Instructional Technology

12th Grade

Hard

Created by

ELMA DASIAN

Used 5+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It displays unwanted ads when a

user is surfing the internet.

malware
spyware
adware
phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a form of malicious software and internet fraud that misleads users into believing there

is a virus on their computer and convince them to pay for a fake malware removal tool.

Deceitware

Rogue security

software

Hoaxware
Fakeware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They present themselves as harmless computer programs so that hackers can penetrate your computer without being detected.

Firewall
Worm

Trojan

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It can monitor your keystrokes, read and delete your files, reformat your hard drive, and access your applications.

Firewall
Spyware
Trojan
Keylogger

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These are unwanted emails.

garbage
trash
junk
spam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They usually make their way on to a computer via a malicious email attachment or USB stick.

phishing
ransomware
trojan

worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They are often attached to files for download, shared via CDs, DVDs, and USB sticks, or loaded on to

computers by opening infected email attachments.

Pharmers

virus

Phishing

Netiquette

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?