Z203 test

Z203 test

University

15 Qs

quiz-placeholder

Similar activities

Blockchain quiz

Blockchain quiz

University

15 Qs

20240808

20240808

University

11 Qs

Basic Network Architecture

Basic Network Architecture

12th Grade - University

10 Qs

Pra UPS 2

Pra UPS 2

University

20 Qs

Distributed Systems

Distributed Systems

University

11 Qs

How much do you know about NFTs?

How much do you know about NFTs?

KG - Professional Development

10 Qs

KLasifikasi Jaringan Komputer

KLasifikasi Jaringan Komputer

1st Grade - University

10 Qs

โทโพโลยีเครือข่าย

โทโพโลยีเครือข่าย

University

20 Qs

Z203 test

Z203 test

Assessment

Quiz

Computers

University

Medium

Created by

Natalia Stempak

Used 8+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is phishing?

A method used to steal personal information through deceptive emails or websites

A technique for optimizing search engine results

A type of cyber attack where attackers pretend to be legitimate entities

A way to safely encrypt sensitive information

An attempt to gain sensitive information by disguising as a trustworthy source in electronic communications

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give an example of online piracy:

Using torrent sites like The Pirate Bay or KickassTorrents to download and share movies and TV shows

Streaming Netflix or Disney Plus

Using peer-to-peer (P2P) networks or unauthorized websites to download music

Downloading and using cracked versions of software

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is NOT cyberstalking?

Spamming

Threatening someone via email or social media

  • Posting false information about someone to damage their reputation

Engaging in an online disagreement on Reddit

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is ransomware?

A type of malware that encrypts a victim's files, demanding payment for the decryption key

software designed to optimize computer performance

A cyber attack where attackers steal data without the victim's knowledge

Malicious software that prevents or limits users from accessing their system

An anti-virus program

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these is NOT cyberterrorism:

Hacking into and disrupting power grid systems, causing widespread blackouts in cities and affecting essential services.

Launching cyber attacks on financial institutions to steal funds, disrupt transactions and cause financial instability.

Encrypting hospital patients data and demanding ransom - potentially putting lives at risk by delaying medical treatment

Encrypting your system files and demanding payment for the decryption key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does it mean that a behavior is legitimate?

somebody follows the laws, rules and regulations

somebody is behaving unethically

somebody is exploiting others for personal gain

somebody is acting against social norms

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Click of an example of an intermediary:

a bank that works as a middleman between you and an online shop

a social media company that provides a platform for communication with your friends and family

a career advisor at a university who helps you get a job placement

another server in a peer-to-peer network

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?