
prevalent types of cyber threats and their sources
Authored by Edmund Del Rosario
Computers
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is NOT a common source of cyber threats?
Malicious software (malware)
Weak passwords
System updates
Phishing emails
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
True or False: Social engineering attacks attempt to trick users into revealing personal information.
True or False: Social engineering attacks attempt to trick users into revealing personal information.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of cyber threat encrypts a user's files and demands a ransom payment to decrypt them?
Phishing
Malware
Ransomware
Spyware
4.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
a type of malware that downloads onto a computer disguised as a legitimate program.
(a)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False: Computer threats are most likely to appear only in outdated software.
True
False
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
How do computer viruses spread. Select all possible answers.
online downloads
email attachments
external flash drive
Typing through key board
7.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Computer threats can be hidden in seemingly legitimate (a) , such as email attachments or website downloads
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?