
CYBER SECURITY VOCABULARY
Authored by Alan Leonel Vera
others
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. What is the type of malware that demands a ransom to release encrypted data?
a) Adware
b) Spyware
c) Ransomware
d) Keylogger
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
2. Which of the following is an attack that overwhelms a system with traffic to make it unavailable?
a) Phishing
b) Denial of Service (DoS)
c) Rootkit
d) Cross-Site Scripting (XSS)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
3. What is a Trojan?
a) A type of spyware that records keystrokes.
b) A malicious program disguised as legitimate software.
c) Malware that spreads across networks.
d) A program that displays unwanted advertisements.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
4. Which type of malware secretly monitors user activity?
a) Worm
b) Spyware
c) Botnet
d) Rootkit
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
5. Which cyber attack deceives users into revealing sensitive information by pretending to be a trusted entity?
a) Phishing
b) Brute Force Attack
c) Cryptojacking
d) Zero-Day Attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
6. What does a Keylogger do?
a) Overload a system with traffic.
b) Record keystrokes to steal sensitive data.
c) Encrypt data and demand a ransom.
d) Spread malware across networks.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
7. Which malware gives attackers access to the root or kernel of a system?
a) Worm
b) Rootkit
c) Adware
d) Keylogger
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?