Cybersecurity Quiz 3

Cybersecurity Quiz 3

10th Grade

15 Qs

quiz-placeholder

Similar activities

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Introduction to Cyber Security Exam

Introduction to Cyber Security Exam

9th - 12th Grade

10 Qs

SQL Injection

SQL Injection

10th Grade

10 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Cybersecurity Vocab

Cybersecurity Vocab

9th - 12th Grade

10 Qs

IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

9th - 11th Grade

10 Qs

Cybersecurity Quiz 3

Cybersecurity Quiz 3

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Tan Siewchoo

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe software designed to disrupt computer operations or gain unauthorized access without the user's knowledge or permission?

Virus

Malware

Worm

Trojan horse

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do worms differ from viruses?

Worms require user initiation

Viruses can run independently

Worms always slow down networks

Viruses replicate by exploiting vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic that distinguishes a Trojan horse from a virus?

Trojan horses infect executable files

Viruses require user initiation

Trojan horses bind to non-executable files

Viruses mutate to avoid detection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware holds a computer system or its data captive until a payment is made?

Logic Bomb

Ransomware

Backdoor

Spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a browser hijacker?

To modify system files

To alter browser settings for redirection

To encrypt data on the computer

To replicate independently over networks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of social engineering attacks?

To exploit software vulnerabilities

To gain unauthorized access through technical means

To manipulate individuals into divulging information or performing actions

To launch malware attacks on computer networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "pretexting" in the context of social engineering?

Requesting personal information in exchange for something

Lying to an individual to gain access to privileged data

Observing and picking up PINs through surveillance

Pretending to be a part of a large crowd to gain entry into a secure location

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?