Cyber Fraud and Security

Cyber Fraud and Security

11th Grade

8 Qs

quiz-placeholder

Similar activities

Safety internet rules quiz

Safety internet rules quiz

9th - 12th Grade

10 Qs

EmpTech

EmpTech

11th Grade

8 Qs

Procedure text (Fase F)

Procedure text (Fase F)

11th Grade

10 Qs

Berbelanja Online dengan Aman

Berbelanja Online dengan Aman

9th - 12th Grade

10 Qs

مكونات الحاسب الآلي ووحدات الإدخال والإخراج

مكونات الحاسب الآلي ووحدات الإدخال والإخراج

11th Grade

10 Qs

SNACK ATTACK

SNACK ATTACK

9th Grade - University

10 Qs

Cuban missile crisis

Cuban missile crisis

9th - 12th Grade

6 Qs

Understanding KTR HKI Concepts

Understanding KTR HKI Concepts

11th Grade

10 Qs

Cyber Fraud and Security

Cyber Fraud and Security

Assessment

Quiz

Others

11th Grade

Easy

Created by

Рина Лукьянова

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main motivation for hackers?

Thrill

For being caught

Gaining money

Righting perceived wrongs

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malware attack is

Money Software

Maltronic Software

Malicious Software

Malteasers Software

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You may use unsecured public Wi-Fi networks for shopping and banking online

Yes

No

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the special online tool for checking reliability of websites?

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You should not respond to an email, text or message asking for financial, personal or security information.

Yes

No

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a cyberattack like Trojan designed to enter and destroy your computer system or to steal personal data:

Fishing

Man-in-the-Middle attack

Password attack

Spyware attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Designed to detect and destroy suspicious activity or virus

Antivirus

Firewall

Sensor

Biometry

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules:

Antivirus

Firewall

Sensor

Biometry