Cybersecurity Key Terms 4, 5, and 6

Cybersecurity Key Terms 4, 5, and 6

8th Grade

18 Qs

quiz-placeholder

Similar activities

IT Dasar

IT Dasar

6th - 8th Grade

15 Qs

PTS KELAS 7

PTS KELAS 7

7th Grade - University

20 Qs

PTS informatika

PTS informatika

8th Grade

20 Qs

Understanding Internet Threats

Understanding Internet Threats

8th Grade

15 Qs

Bezpieczeństwo w sieci dla uczniów

Bezpieczeństwo w sieci dla uczniów

6th Grade - University

20 Qs

Digital Ethics and AI Awareness

Digital Ethics and AI Awareness

7th Grade - University

20 Qs

systems software

systems software

7th Grade - University

17 Qs

Kelas 8 - Halaman 27 (UH Bab 2)

Kelas 8 - Halaman 27 (UH Bab 2)

8th Grade - University

20 Qs

Cybersecurity Key Terms 4, 5, and 6

Cybersecurity Key Terms 4, 5, and 6

Assessment

Quiz

Information Technology (IT)

8th Grade

Easy

Created by

Linda Berkheimer

Used 3+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a form of malware?

Zero-day vulnerability

Logic Bomb

Worm

Trojan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which threat is identified as its ability to remain hidden for long periods of time?

Advanced persistent threat (APT)

Polymorphic virus

Trojan

Armored virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware encrypts data so the user cannot access it unless a fee is paid to the hacker?

Trojan

Ransomware

Rootkit

Polymorphic

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines a zero-day vulnerability?

Software that has been installed directly on hardware

Personal information found in the trash

Technology that tracks a user’s keystrokes

A vulnerability that has existed in software since its release

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cookie only exists when visiting a website and is deleted once the browser is closed?

Session cookies

Persistent cookies

Secure cookies

Third-party cookies

6.

DRAG AND DROP QUESTION

30 sec • 1 pt

Social engineering often relies on (a)   , which is the use of lies or scams to obtain private information.

Phishing

Pretexting

Baiting

Quizzing

7.

DROPDOWN QUESTION

30 sec • 1 pt

A phishing attack in which the recipients are deliberately chosen for attack is known as (a)   .

Spear phishing

Watering hole

Pharming

Whale phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?