Cyberattack revision
Quiz by sharon Hockley
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
28 questions
Show answers
- Q1What is Malware?Software designed to interfere with a computer's normal functioningA small self −contained and self −replicating computer program that invades computers on a network and usually performs a destructive action.A social engineering attack intended to redirect a website's traffic to another fake website.A social engineering act that involves standing behind a targeted victim and watching what they type.30s
- Q2What is PHISHING ?A social engineering scam by which a user is tricked into revealing personal\confidential information (via email or website)A social engineering act of creating and using an invented scenario to obtain information or money from a targeted victim (using persuasion).Malware that replicates by reproducing itself or infecting other programs by modifying them.Software designed to interfere with a computer's normal functioning30s
- Q3What is SPAM ?Email that is not wanted -An email that is sent to large number of people and contains mostly advertisingSoftware designed to interfere with a computer's normal functioningSoftware that gathers data without the knowledge of the user, and sends them to a different entity.A social engineering scam by which a user is tricked into revealing personal\confidential information (via email or website)30s
- Q4What is PHARMING?A social engineering attack intended to redirect a website's traffic to another fake website.Malicious computer program which is used to hack into a computer by misleading users of its true intent.A social engineering act of creating and using an invented scenario to obtain information or money from a targeted victim (using persuasion).Software designed to interfere with a computer's normal functioning30s
- Q5What is a WORM?A program that records which keys a user pressesA trial and error method used to obtain information such as a user's password, identification etc.Software designed to interfere with a computer's normal functioningA small self −contained and self −replicating computer program that invades computers on a network and usually performs a destructive action.30s
- Q6What is BLAGGING?Multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.A social engineering scam by which a user is tricked into revealing personal\confidential information (via email or website)Malicious computer program which is used to hack into a computer by misleading users of its true intent.A social engineering act of creating and using an invented scenario to obtain information or money from a targeted victim (using persuasion).30s
- Q7What is a BRUTE FORCE ATTACK?Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.A trial and error method used to obtain information such as a user's password, identification etc.Multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.A social engineering attack intended to redirect a website's traffic to another fake website.30s
- Q8What is a DENIAL OF SERVICE ATTACK?Malicious computer program which is used to hack into a computer by misleading users of its true intent.Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.Multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.Software designed to interfere with a computer's normal functioning30s
- Q9What is a VIRUS?A social engineering act that involves standing behind a targeted victim and watching what they type.Malware that replicates by reproducing itself or infecting other programs by modifying them.A trial and error method used to obtain information such as a user's password, identification etc.Software designed to interfere with a computer's normal functioning30s
- Q10What is SPYWARE?Software that gathers data without the knowledge of the user, and sends them to a different entity.A small self −contained and self −replicating computer program that invades computers on a network and usually performs a destructive action.A program that records which keys a user pressesMalware that replicates by reproducing itself or infecting other programs by modifying them.30s
- Q11What is a TROJAN?A trial and error method used to obtain information such as a user's password, identification etc.A social engineering act that involves standing behind a targeted victim and watching what they type.Malicious computer program which is used to hack into a computer by misleading users of its true intent.Software that gathers data without the knowledge of the user, and sends them to a different entity.30s
- Q12What is a KEY LOGGER?A program that records which keys a user pressesMalware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.Software that gathers data without the knowledge of the user, and sends them to a different entity.A social engineering attack intended to redirect a website's traffic to another fake website.30s
- Q13What is RANSOMEWARE?A social engineering act that involves standing behind a targeted victim and watching what they type.A social engineering act of creating and using an invented scenario to obtain information or money from a targeted victim (using persuasion).Multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.30s
- Q14What is SHOULDERING?A program that records which keys a user pressesA small self −contained and self −replicating computer program that invades computers on a network and usually performs a destructive action.A social engineering act that involves standing behind a targeted victim and watching what they type.Malware that replicates by reproducing itself or infecting other programs by modifying them.30s
- Q15Software designed to interfere with a computer's normal functioningVIRUSWORMSPAMMALWARE30s