G10 CS Sem 2 TA The Internet, AI, and Programming

G10 CS Sem 2 TA The Internet, AI, and Programming

10th Grade

21 Qs

quiz-placeholder

Similar activities

Network Threats

Network Threats

9th - 12th Grade

16 Qs

Cyber security

Cyber security

10th - 11th Grade

19 Qs

Networking

Networking

9th - 11th Grade

21 Qs

Ethical, Legal and Social Issues of Computing

Ethical, Legal and Social Issues of Computing

9th - 11th Grade

20 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Cyber Security

Cyber Security

9th - 12th Grade

20 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

Malware

Malware

7th - 10th Grade

22 Qs

G10 CS Sem 2 TA The Internet, AI, and Programming

G10 CS Sem 2 TA The Internet, AI, and Programming

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Fritz Bansag

Used 4+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all selection that describe Social Engineering.

It is the manipulating, tricking, or deceiving people to obtain data

it forces to make error in giving sensitive information

Uses impersonation, pop-ups, phishing to get data

It collects information through civil engineering

are applications for socialization.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a cyber attack that redirects a website's traffic to another fake website by installing a malicious program on the victim's computer to gain access access it.

Pharming

Phishing

Vishing

Smishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a malicious spoofing attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a fake owner.

Pharming

Phishing

Vishing

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vishing

is a cyber attack that redirects a website's traffic to another fake website by installing a malicious program on the victim's computer to gain access access it.

is a malicious spoofing attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a fake owner.

refers to scams conducted through phone calls. This is like receiving a phishing email, except the attacker calls you directly with a recorded or in-person interaction instead of reaching out digitally

is a scam sent via text message to your phone instead of email to your inbox. The word comes from combining the words "SMS", meaning Short Message Service (text message) and "phishing".

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing

is a cyber attack that redirects a website's traffic to another fake website by installing a malicious program on the victim's computer to gain access access it.

is a malicious spoofing attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a fake owner.

refers to scams conducted through phone calls. This is like receiving a phishing email, except the attacker calls you directly with a recorded or in-person interaction instead of reaching out digitally

is a scam sent via text message to your phone instead of email to your inbox. The word comes from combining the words "SMS", meaning Short Message Service (text message) and "phishing".

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pharming

is a cyber attack that redirects a website's traffic to another fake website by installing a malicious program on the victim's computer to gain access access it.

is a malicious spoofing attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a fake owner.

refers to scams conducted through phone calls. This is like receiving a phishing email, except the attacker calls you directly with a recorded or in-person interaction instead of reaching out digitally

is a scam sent via text message to your phone instead of email to your inbox. The word comes from combining the words "SMS", meaning Short Message Service (text message) and "phishing".

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick solutions to prevent pharming

Use secure and updated antivirus software, regularly update operating systems and software, implement DNS security measures, and educate users about phishing scams.

Check the spelling and tone of the email/website

Click on links that are very interesting from cold email

Never provide personal details online

Install firewall to check if the website is valid

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?