prevalent types of cyber threats and their sources

prevalent types of cyber threats and their sources

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

12th Grade - Professional Development

8 Qs

E-safety

E-safety

6th Grade - Professional Development

15 Qs

Git & Github

Git & Github

Professional Development

10 Qs

ICT Quiz

ICT Quiz

Professional Development

15 Qs

Microsoft Word Quiz

Microsoft Word Quiz

Professional Development

10 Qs

Computer Basics/Terminology

Computer Basics/Terminology

Professional Development

15 Qs

Delcom Group Security Awareness Training

Delcom Group Security Awareness Training

Professional Development

10 Qs

Quiz 3 Windows Server

Quiz 3 Windows Server

Professional Development

10 Qs

prevalent types of cyber threats and their sources

prevalent types of cyber threats and their sources

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Edmund Del Rosario

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a common source of cyber threats?

Malicious software (malware)

Weak passwords

System updates

Phishing emails

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  • True or False: Social engineering attacks attempt to trick users into revealing personal information.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber threat encrypts a user's files and demands a ransom payment to decrypt them?

Phishing

Malware

Ransomware

Spyware

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

a type of malware that downloads onto a computer disguised as a legitimate program.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Computer threats are most likely to appear only in outdated software.

True

False

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How do computer viruses spread. Select all possible answers.

online downloads

email attachments

external flash drive

Typing through key board

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Computer threats can be hidden in seemingly legitimate __________, such as email attachments or website downloads

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?