E-Security

E-Security

11th Grade

31 Qs

quiz-placeholder

Similar activities

Feb. Assessment Revision

Feb. Assessment Revision

9th - 11th Grade

26 Qs

Cybersecurity II - Semester Exam Review by Mr. Benvenuto

Cybersecurity II - Semester Exam Review by Mr. Benvenuto

12th Grade

31 Qs

Data Risks

Data Risks

10th - 12th Grade

26 Qs

Y11 Network Threats Homework

Y11 Network Threats Homework

12th Grade

34 Qs

FIRSTQ LONG TEST IN ETECH

FIRSTQ LONG TEST IN ETECH

11th Grade

35 Qs

Empowerment Technology Unit 2 Practice Quiz

Empowerment Technology Unit 2 Practice Quiz

11th Grade

30 Qs

Vulnerabilities and Threats

Vulnerabilities and Threats

9th - 12th Grade

30 Qs

Unit 1 Assessment PRACTICE

Unit 1 Assessment PRACTICE

12th Grade

29 Qs

E-Security

E-Security

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Ayorinde Omojuwa

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is the name of an application that appears to look like a helpful application but instead does harm to your computer?
virus
worm
malware
Trojan horse

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IT security recently found a program on your co-worker's computer that apparently tracked all of the words that they typed into the computer. what kind of malware is this?
Keylogger 
keyblogger
trojan horse
keystroke virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rose just installed a new search engine on her laptop.now whenever she searches the internet, she gets several pop-up windows directing her to buy products.what does rose have?
ransomware
spyware
Adware
trojan horse

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You were browsing the web on a questionable website, and now you get a pop-up window stating that if you do not pay $100 within one hour, all files on your computer will be destroyed.what is this an example of?
heistware
theftware
extortionware
Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "spam" refer to in computing?
excessive pop-up windows
unsolicited emails
social engineering attemps
installing malware on a computer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

David just heard of a program that if installed on your computer gives the attacker administrator-like access to your machine. what type of software is he talking about?
trojan horse
spyware
ransomeware
rootkit

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are activities that a hacker might attempt?
Stealing usernames and passwords
Modifying website content
Disrupting network communications
All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers