1) A set of rules that state how things should be presented. a) RANSOMWARE b) HOUSE STYLE c) GOOGLE d) SHOULDER SURFING 2) What people think about based on your online activity a) ONLINE REPUTATION b) PASSWORDS c) SOCIAL ENGINEERING d) CYBER SECURITY 3) a search engine a) SOCIAL ENGINEERING b) BLAGGING c) GOOGLE d) HOUSE STYLE 4) The protection of information systems from theft or damage a) SPYWARE b) SOCIAL ENGINEERING c) CYBER SECURITY d) RANSOMWARE 5) What is Malware short for? a) ONLINE REPUTATION b) KEYLOGGER c) Malicious Code d) SHOULDER SURFING 6) Tricking someone into giving you their details. a) SOCIAL ENGINEERING b) KEYLOGGER c) GOOGLE d) RANSOMWARE 7) Spreads through a computer, stopping things working. a) GOOGLE b) PASSWORDS c) VIRUS d) RANSOMWARE 8) Looking at what you are doing on a computer. a) KEYLOGGER b) PHISHING c) SOCIAL ENGINEERING d) SPYWARE 9) Can see what you are typing a) KEYLOGGER b) Malicious Code c) BLAGGING d) RANSOMWARE 10) Asking for money to get your system back. a) RANSOMWARE b) VIRUS c) PHARMING d) BLAGGING 11) Used to protect your accounts. a) PASSWORDS b) SOCIAL ENGINEERING c) ONLINE REPUTATION d) BLAGGING 12) Making up a fake story to get someones information. a) PHISHING b) VIRUS c) GOOGLE d) BLAGGING 13) Sending emails and text messages with malicious links. a) GOOGLE b) SPYWARE c) PHISHING d) PHARMING 14) Creating fake login pages or websites for people to enter their username and password. a) PASSWORDS b) PHARMING c) ONLINE REPUTATION d) PHISHING 15) Looking over someones shoulder to get their pin. a) SHOULDER SURFING b) RANSOMWARE c) CYBER SECURITY d) PHARMING 16) A way of authenticaton is........ a) Biometrics b) Firewalls c) Encryption d) IP Address 17) An example of an IP address is......... a) 192.36.14.256 b) 192.36.14.1 c) AA.BB.CC.DD d) A4-5B-6F-1A-44-FF 18) An example of a MAC address is......... a) 192.36.14.256 b) 192.36.14.1 c) AA.BB.CC.DD d) A4-5B-6F-1A-44-FF 19) A MAC address is used to uniquely identify a device on a network. a) True b) False 20) The process of scrambling data so that only someone with the code or key can read it. a) Authentication b) Firewall c) Encryption d) IP address 21) A username, smart cards, face ID and CAPTCHA are all methods of....... a) Firewalls b) Authentication c) IP addresses d) Encryption

排行榜

视觉风格

选项

切换模板

恢复自动保存: