lesson 5

lesson 5

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cyber-attacks, Domain Disputes

Cyber-attacks, Domain Disputes

Professional Development

11 Qs

ISMS Awareness Quiz

ISMS Awareness Quiz

Professional Development

15 Qs

Conficker

Conficker

KG - Professional Development

15 Qs

PRE- TEST

PRE- TEST

Professional Development

10 Qs

Information Disclosure

Information Disclosure

Professional Development

10 Qs

ICT

ICT

KG - Professional Development

11 Qs

DLD DLE WS1

DLD DLE WS1

Professional Development

11 Qs

lesson 5

lesson 5

Assessment

Quiz

Other

Professional Development

Medium

Created by

CARLO SANTUICO

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What term describes a type of malicious software designed to block access to a computer system until a sum of money is paid?

virus

trojan

ransomware

worm

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

WWhich of the following is NOT a common type of malware?

spyware

firewall

adware

rootkit

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following best describes a Trojan horse?

A type of malware that spreads rapidly through a network

Malicious software that encrypts files and demands payment for decryption

Software that disguises itself as legitimate but contains harmful code

A form of malware that steals sensitive information

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the primary purpose of a firewall?

To detect and remove malware from a computer system

To prevent unauthorized access to a network or computer system

To encrypt data transmissions over a network

To back up important files and folders

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What type of malware is specifically designed to monitor and record user activities on a computer?

Spyware

Worm

rootkit

Adware

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following is an example of a social engineering attack?

SQL injection

Distributed Denial of Service (DDoS)

Phishing

Cross-site scripting (XSS)

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the term for a cybersecurity attack in which an attacker attempts to gain unauthorized access to a system by repeatedly guessing passwords?

Brute force attack

Man-in-the-middle attack

Buffer overflow attack

Denial of Service (DoS) attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?