MODULE 2: Attacks, cincepts and techniques QUIZ

MODULE 2: Attacks, cincepts and techniques QUIZ

9th Grade

5 Qs

quiz-placeholder

Similar activities

Vocabulary

Vocabulary

8th - 10th Grade

10 Qs

Secure Passwords

Secure Passwords

KG - University

10 Qs

Analisis SWOT Industri

Analisis SWOT Industri

9th - 12th Grade

10 Qs

Minecraft

Minecraft

KG - Professional Development

10 Qs

Jigsaw Safety Test

Jigsaw Safety Test

9th - 12th Grade

10 Qs

Robótica Educativa

Robótica Educativa

3rd - 9th Grade

9 Qs

C++

C++

9th - 12th Grade

10 Qs

Adopt me pets

Adopt me pets

2nd - 10th Grade

10 Qs

MODULE 2: Attacks, cincepts and techniques QUIZ

MODULE 2: Attacks, cincepts and techniques QUIZ

Assessment

Quiz

Instructional Technology

9th Grade

Practice Problem

Medium

Created by

Robert Robinson

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

Malware designed to track your online activity and capture your data

Adware
Spyware
Ransomware
Trojan horse

2.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

Select the correct answer from the dropdowns, then Submit:

You have started getting an error message when accessing your computer: ‘Your connection was interrupted. A network change was detected.'

Social engineering

SEO poisoning

DoS

3.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Which of the following examples illustrates how malware might be concealed?

Using strong passwords to protect files.
Installing antivirus programs to detect threats.
Regularly updating software to prevent malware.
Embedding malware in legitimate software or disguising it as harmless files.

4.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

'Securing physical access to target equipment is an organization’s best defense against a cyber attack.' Is this true or false?

True
False

5.

MULTIPLE SELECT QUESTION

2 mins • 20 pts

Can you identify the software vulnerability from the following descriptions?

1.Occurs when data is written beyond the limits of memory areas that are allocated to an application.

2.Occurs when an ordered or timed set of processes is disrupted or altered by an exploit.

3.Occurs through the improper use of practices that manage equipment, data or applications

Buffer overflow

Race condition

Access control

Social engineering

Packet sniffing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?