1) A set of rules that state how things should be presented. a) RANSOMWARE b) HOUSE STYLE c) GOOGLE d) SHOULDER SURFING 2) What people think about based on your online activity a) ONLINE REPUTATION b) PASSWORDS c) SOCIAL ENGINEERING d) CYBER SECURITY 3) a search engine a) SOCIAL ENGINEERING b) BLAGGING c) GOOGLE d) HOUSE STYLE 4) The protection of information systems from theft or damage a) SPYWARE b) SOCIAL ENGINEERING c) CYBER SECURITY d) RANSOMWARE 5) What is Malware short for? a) ONLINE REPUTATION b) KEYLOGGER c) Malicious Code d) SHOULDER SURFING 6) Tricking someone into giving you their details. a) SOCIAL ENGINEERING b) KEYLOGGER c) GOOGLE d) RANSOMWARE 7) Spreads through a computer, stopping things working. a) GOOGLE b) PASSWORDS c) VIRUS d) RANSOMWARE 8) Looking at what you are doing on a computer. a) KEYLOGGER b) PHISHING c) SOCIAL ENGINEERING d) SPYWARE 9) Can see what you are typing a) KEYLOGGER b) Malicious Code c) BLAGGING d) RANSOMWARE 10) Asking for money to get your system back. a) RANSOMWARE b) VIRUS c) PHARMING d) BLAGGING 11) Used to protect your accounts. a) PASSWORDS b) SOCIAL ENGINEERING c) ONLINE REPUTATION d) BLAGGING 12) Making up a fake story to get someones information. a) PHISHING b) VIRUS c) GOOGLE d) BLAGGING 13) Sending emails and text messages with malicious links. a) GOOGLE b) SPYWARE c) PHISHING d) PHARMING 14) Creating fake login pages or websites for people to enter their username and password. a) PASSWORDS b) PHARMING c) ONLINE REPUTATION d) PHISHING 15) Looking over someones shoulder to get their pin. a) SHOULDER SURFING b) RANSOMWARE c) CYBER SECURITY d) PHARMING 16) A way of authenticaton is........ a) Biometrics b) Firewalls c) Encryption d) IP Address 17) An example of an IP address is......... a) 192.36.14.256 b) 192.36.14.1 c) AA.BB.CC.DD d) A4-5B-6F-1A-44-FF 18) An example of a MAC address is......... a) 192.36.14.256 b) 192.36.14.1 c) AA.BB.CC.DD d) A4-5B-6F-1A-44-FF 19) A MAC address is used to uniquely identify a device on a network. a) True b) False 20) The process of scrambling data so that only someone with the code or key can read it. a) Authentication b) Firewall c) Encryption d) IP address 21) A username, smart cards, face ID and CAPTCHA are all methods of....... a) Firewalls b) Authentication c) IP addresses d) Encryption
0%
CYBER SECURITY
共享
共享
共享
由
Mrdoskocz
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
随堂测验
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?