1st session

1st session

9th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

programming basic

programming basic

5th Grade - University

10 Qs

Audio and Video Systems

Audio and Video Systems

12th Grade

10 Qs

H&S Processes & Evaluating

H&S Processes & Evaluating

9th Grade

10 Qs

2-OSH MS

2-OSH MS

12th Grade

10 Qs

Mastering SolidWorks Sketching

Mastering SolidWorks Sketching

12th Grade

10 Qs

1st session

1st session

Assessment

Quiz

Engineering

9th - 12th Grade

Medium

Created by

Salma Mohsen

Used 6+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

attaches itself to a legitimate program or file and spreads when the infected file is executed. It can damage files, corrupt data,

Virus

Worm

Keylogger

Ransomware

2.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

They replicate themselves and spread across networks, often exploiting vulnerabilities in networked systems

3.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

disguise themselves as legitimate software or files but perform malicious actions once executed .they are often used to steal sensitive information, like passwords, or to give unauthorized access to attackers

4.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

are tools that record the keystrokes typed by a user, often without their knowledge

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Through deceptive emails or websites

virus

Man in the middle

phishing

worm