Understanding Cybersecurity Threats

Understanding Cybersecurity Threats

7th Grade

9 Qs

quiz-placeholder

Similar activities

Grade 7- Files and Folders

Grade 7- Files and Folders

7th Grade

10 Qs

ICT 7 Module 3

ICT 7 Module 3

6th - 8th Grade

13 Qs

Avaliação Diagnóstica - TIC

Avaliação Diagnóstica - TIC

7th Grade

11 Qs

Folder dan File

Folder dan File

7th Grade

10 Qs

Pretest

Pretest

7th Grade

8 Qs

Pengenalan Bab 3_TIK 7_Semester 1

Pengenalan Bab 3_TIK 7_Semester 1

7th Grade

10 Qs

Soal Sistem Komputer

Soal Sistem Komputer

7th Grade

10 Qs

Quiz sobre la evolución de las computadoras

Quiz sobre la evolución de las computadoras

4th Grade - University

10 Qs

Understanding Cybersecurity Threats

Understanding Cybersecurity Threats

Assessment

Quiz

Information Technology (IT)

7th Grade

Easy

Created by

Steven Senjaya

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a phishing attack?

A phishing attack is a deceptive attempt to obtain sensitive information by masquerading as a trustworthy entity.

A phishing attack is a method of securing sensitive information.

A phishing attack is a type of malware that infects computers.

A phishing attack is a legitimate request for personal information from a bank.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How can you identify a phishing email?

Verify the email with a phone call to the sender

Check for suspicious sender addresses, generic greetings, urgent language, poor grammar, and unexpected attachments or links.

Ignore any emails that seem too good to be true

Look for personalized messages from known contacts

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is pharming and how does it work?

Pharming is a method of improving website performance.

Pharming is a type of medication used to treat allergies.

Pharming is a cyber attack that redirects users from legitimate websites to fraudulent ones.

Pharming refers to the process of creating new pharmaceuticals.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a worm differ from a virus?

A worm is self-replicating and spreads automatically, while a virus attaches to files and requires user action to spread.

A worm can only infect specific types of files, whereas a virus can infect any file type.

A worm is a type of virus that needs a host file to operate.

A worm requires user action to spread, while a virus spreads automatically.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan Horse in cybersecurity?

A Trojan Horse is a type of antivirus software that protects against malware.

A Trojan Horse is a physical device used to secure computer networks.

A Trojan Horse is a type of malware that pretends to be legitimate software to deceive users into installing it.

A Trojan Horse is a method of data encryption used to secure files.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware and what does it do?

Spyware is a tool used to improve internet speed.

Spyware is malicious software that collects user information without consent.

Spyware is a legitimate program that enhances computer performance.

Spyware is a type of antivirus software that protects user data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is adware and how can it affect your device?

Adware is a legitimate software that helps manage system updates.

Adware is a type of antivirus software that protects your device.

Adware is a tool that enhances device performance and speeds up internet browsing.

Adware is software that displays unwanted ads and can slow down your device, consume bandwidth, and compromise privacy.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware and what does it do to your files?

Ransomware deletes your files permanently.

Ransomware encrypts your files and demands a ransom for their release.

Ransomware slows down your computer without affecting files.

Ransomware creates backups of your files.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you protect yourself from malware attacks?

Click on any email link

Ignore all software updates

Regularly update software, use antivirus, avoid suspicious links, enable firewalls, and practice safe browsing.

Disable all security settings