Search Header Logo

Z203 test

Authored by Natalia Stempak

Computers

University

Used 8+ times

Z203 test
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is phishing?

A method used to steal personal information through deceptive emails or websites

A technique for optimizing search engine results

A type of cyber attack where attackers pretend to be legitimate entities

A way to safely encrypt sensitive information

An attempt to gain sensitive information by disguising as a trustworthy source in electronic communications

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give an example of online piracy:

Using torrent sites like The Pirate Bay or KickassTorrents to download and share movies and TV shows

Streaming Netflix or Disney Plus

Using peer-to-peer (P2P) networks or unauthorized websites to download music

Downloading and using cracked versions of software

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is NOT cyberstalking?

Spamming

Threatening someone via email or social media

  • Posting false information about someone to damage their reputation

Engaging in an online disagreement on Reddit

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is ransomware?

A type of malware that encrypts a victim's files, demanding payment for the decryption key

software designed to optimize computer performance

A cyber attack where attackers steal data without the victim's knowledge

Malicious software that prevents or limits users from accessing their system

An anti-virus program

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these is NOT cyberterrorism:

Hacking into and disrupting power grid systems, causing widespread blackouts in cities and affecting essential services.

Launching cyber attacks on financial institutions to steal funds, disrupt transactions and cause financial instability.

Encrypting hospital patients data and demanding ransom - potentially putting lives at risk by delaying medical treatment

Encrypting your system files and demanding payment for the decryption key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does it mean that a behavior is legitimate?

somebody follows the laws, rules and regulations

somebody is behaving unethically

somebody is exploiting others for personal gain

somebody is acting against social norms

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Click of an example of an intermediary:

a bank that works as a middleman between you and an online shop

a social media company that provides a platform for communication with your friends and family

a career advisor at a university who helps you get a job placement

another server in a peer-to-peer network

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?