Internet Safety Quiz

Quiz
•
Information Technology (IT)
•
11th Grade
•
Medium
chrisbenedict sevilleno
Used 2+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why should passwords be treated like a toothbrush?
They should be replaced on a regular schedule to prevent buildup.
They should be uniquely refreshed periodically to avoid predictability.
They should remain strictly personal and never be shared.
They should be updated often and kept securely in a private space.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Logging into public Wi‑Fi is risky because:
It can lead to unusual device strain and potential overheating risks.
It can allow cyber intruders to capture unprotected data transmissions.
It can trigger unauthorized software installations without your consent.
It can prompt inadvertent sharing of login credentials with unknown users.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Pharming differs from phishing because it:
Necessitates user engagement by clicking on deceptive links.
Automatically reroutes users to counterfeit websites without a direct click.
Selectively exploits specific platforms rather than using broad email prompts.
Employs alternative contact methods, such as phone calls, to divert users.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Adware primarily affects users by:
Compromising files by encrypting them and soliciting a ransom.
Bombarding browsers with persistent, intrusive pop‑up advertisements.
Propagating spam emails indiscriminately to all contacts.
Disrupting system integrity by removing or corrupting critical files.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Trojan is dangerous because it:
Self‑replicates by infecting adjacent files and programs.
Camouflages itself as benign software to clandestinely access your system.
Primarily disseminates through email attachments, limiting its reach.
Impedes performance by significantly slowing down network connectivity.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spyware is more harmful than keyloggers because it:
Is limited to recording keystrokes, primarily focusing on passwords.
Infiltrates systems to access a broad range of data—including browsing history—and may impair system integrity.
Concentrates solely on exploiting vulnerabilities in public Wi‑Fi networks.
Initiates file encryption and ransom demands as its primary attack vector.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rogue security software tricks users by:
Misleading them with promises of complimentary antivirus upgrades.
Deceiving them through counterfeit virus alerts that promote worthless solutions.
Obstructing access to genuine websites under the guise of protection.
Exploiting user data by encrypting files and demanding unwarranted fees.
Create a free account and access millions of resources
Similar Resources on Wayground
19 questions
1. Quiz z poleceń SQL_DDL_DML_DQL

Quiz
•
11th Grade
21 questions
E5-1 Data Processing CE2

Quiz
•
9th Grade - University
15 questions
CodeHS Principles of Computing 6.8.1 The Internet Quiz

Quiz
•
9th - 12th Grade
15 questions
Recap Handout 3 & 4

Quiz
•
6th Grade - University
20 questions
Data Types and Validation Checks Quiz

Quiz
•
11th Grade
15 questions
MakeCode Arcade Questions

Quiz
•
10th Grade - University
20 questions
Quiz Sistem Operasi

Quiz
•
11th Grade
20 questions
ELEMEN INFORMATIKA

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
28 questions
Ser vs estar

Quiz
•
9th - 12th Grade
13 questions
BizInnovator Startup - Experience and Overview

Quiz
•
9th - 12th Grade
16 questions
AP Biology: Unit 1 Review (CED)

Quiz
•
9th - 12th Grade
7 questions
SAT Reading & Writing Practice Test - Reading Focus

Quiz
•
11th Grade
20 questions
Parallel lines and transversals

Quiz
•
9th - 12th Grade