
Understanding Cybersecurity Threats
Authored by Jesse Ruffin
Information Technology (IT)
10th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of a phishing attack?
To steal physical property
To obtain sensitive information
To damage hardware
To improve network speed
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of malware?
Virus
Worm
Firewall
Trojan Horse
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ransomware typically demands payment in which form?
Credit card
Cryptocurrency
Cash
Check
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common characteristic of social engineering attacks?
Use of encryption
Exploiting human psychology
Physical destruction of devices
Network scanning
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key difference between a virus and a worm?
A virus can replicate itself, while a worm cannot
A worm can spread without human action, while a virus needs a host file
A virus is always harmful, while a worm is not
A worm is a type of antivirus software
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common sign of a phishing email?
Personalized greeting
Spelling and grammatical errors
Secure email address
No attachments
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of ransomware?
To delete files permanently
To encrypt files and demand payment for decryption
To monitor user activity
To improve system performance
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?