Cybersecurity

Cybersecurity

12th Grade

•

30 Qs

quiz-placeholder

Similar activities

Unit 1: Prologue

Unit 1: Prologue

8th - 12th Grade

•

25 Qs

Znajomość regulaminu PKM

Znajomość regulaminu PKM

1st - 12th Grade

•

25 Qs

Valentine on Quizizz

Valentine on Quizizz

10th - 12th Grade

•

25 Qs

Włókna sztuczne

Włókna sztuczne

12th Grade

•

25 Qs

Biografi

Biografi

12th Grade

•

25 Qs

Ouat Quiz

Ouat Quiz

5th Grade - Professional Development

•

26 Qs

Among Us

Among Us

KG - Professional Development

•

28 Qs

PAGSUSULIT 2 IKALAWANG BAHAGI

PAGSUSULIT 2 IKALAWANG BAHAGI

12th Grade

•

25 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

•

Other

•

12th Grade

•

Practice Problem

•

Medium

Created by

Marian Somera

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of malicious software infects and spreads by attaching itself to legitimate files or programs?

Worm
File infector
Trojan horse
Spyware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a broad category of malicious programs designed to cause harm to computer systems or users?

Spyware
Ransomware
Malware
Firewall

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of social engineering attack involves tricking users into providing sensitive information by posing as a trustworthy entity?

Vishing
Smishing
Spoofing
Phishing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of malware encrypts files or locks computer systems, demanding a ransom for their release?

Ransomware
Spyware
Trojan horse
Phishing

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of malware secretly monitors and collects information about a user's activities without their knowledge or consent?

Spyware
Ransomware
Adware
Trojan horse

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a network of compromised computers or devices infected with malware and controlled remotely by a malicious actor called?

malwarenet
virusweb
botnet
trojanmesh

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What are software vulnerabilities or weaknesses that are unknown to the software vendor or developers and have not been patched or fixed?

zero-day vulnerabilities
early-day vulnerabilities
pre-day vulnerabilities
first-day vulnerabilities

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?