Understanding Cybersecurity Threats

Understanding Cybersecurity Threats

7th Grade

9 Qs

quiz-placeholder

Similar activities

IGCSE ICT Software and Hardware

IGCSE ICT Software and Hardware

6th - 8th Grade

13 Qs

LATIHAN 4 SK

LATIHAN 4 SK

7th Grade

10 Qs

Grade 7- Files and Folders

Grade 7- Files and Folders

7th Grade

10 Qs

ICT, Phishing and Malware

ICT, Phishing and Malware

7th - 12th Grade

6 Qs

Keamanan dalam Teknologi Digital

Keamanan dalam Teknologi Digital

7th Grade

10 Qs

Computer software

Computer software

7th Grade

10 Qs

3RD TERM 2ND C.A.T (I.C.T) YR5

3RD TERM 2ND C.A.T (I.C.T) YR5

5th Grade - University

10 Qs

ICT 7 Module 3

ICT 7 Module 3

6th - 8th Grade

13 Qs

Understanding Cybersecurity Threats

Understanding Cybersecurity Threats

Assessment

Quiz

Information Technology (IT)

7th Grade

Easy

Created by

Steven Senjaya

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a phishing attack?

A phishing attack is a deceptive attempt to obtain sensitive information by masquerading as a trustworthy entity.

A phishing attack is a method of securing sensitive information.

A phishing attack is a type of malware that infects computers.

A phishing attack is a legitimate request for personal information from a bank.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How can you identify a phishing email?

Verify the email with a phone call to the sender

Check for suspicious sender addresses, generic greetings, urgent language, poor grammar, and unexpected attachments or links.

Ignore any emails that seem too good to be true

Look for personalized messages from known contacts

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is pharming and how does it work?

Pharming is a method of improving website performance.

Pharming is a type of medication used to treat allergies.

Pharming is a cyber attack that redirects users from legitimate websites to fraudulent ones.

Pharming refers to the process of creating new pharmaceuticals.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a worm differ from a virus?

A worm is self-replicating and spreads automatically, while a virus attaches to files and requires user action to spread.

A worm can only infect specific types of files, whereas a virus can infect any file type.

A worm is a type of virus that needs a host file to operate.

A worm requires user action to spread, while a virus spreads automatically.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan Horse in cybersecurity?

A Trojan Horse is a type of antivirus software that protects against malware.

A Trojan Horse is a physical device used to secure computer networks.

A Trojan Horse is a type of malware that pretends to be legitimate software to deceive users into installing it.

A Trojan Horse is a method of data encryption used to secure files.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware and what does it do?

Spyware is a tool used to improve internet speed.

Spyware is malicious software that collects user information without consent.

Spyware is a legitimate program that enhances computer performance.

Spyware is a type of antivirus software that protects user data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is adware and how can it affect your device?

Adware is a legitimate software that helps manage system updates.

Adware is a type of antivirus software that protects your device.

Adware is a tool that enhances device performance and speeds up internet browsing.

Adware is software that displays unwanted ads and can slow down your device, consume bandwidth, and compromise privacy.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware and what does it do to your files?

Ransomware deletes your files permanently.

Ransomware encrypts your files and demands a ransom for their release.

Ransomware slows down your computer without affecting files.

Ransomware creates backups of your files.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you protect yourself from malware attacks?

Click on any email link

Ignore all software updates

Regularly update software, use antivirus, avoid suspicious links, enable firewalls, and practice safe browsing.

Disable all security settings