SysAd - Quiz 07
Quiz by SRTB
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
15 questions
Show answers
- Q1This anything that can harm a computerVulnerabilityDegrees of harmCountermeasuresThreats45s
- Q2This is the levwl of potential damageCountermeasuresVulnerabilityThreatsDegrees of harm45s
- Q3These are steps taken to block a threatThreatsCountermeasuresDegrees of harmVulnerability45s
- Q4In the discussion, I gave a situation where a person had their simcard replaced by someone using a fake ID then gaining access to their online accounts, which threat to user does this sample belong to?Loss of privacyWeb bugsIdentify theftSpyware45s
- Q5As discussed, which of the ff actions are regarded as safe when paying using your debit/ credit cards?Sharing the CVV to the cashier so the transaction will go throughMake sure you have a sticker convering the CVV before payingHand-in your cards to the cashier while payingInsist on being the one to tap or insert the card in paying45s
- Q6Which threat to users pertain to small programs embedded in gif images?Loss of privacyWeb bugsSpywareIdentify theft45s
- Q7<ABC>Which of the ff are threats to hardware?Natural DisastersTheft and vandalismHuman threatsPower-related threats45s
- Q8This is considered as the most serious threatThreats to UserThreats to DataThreats to Hardware45s
- Q9In the discussion, what was the way that the "i love you' virus was spread?through emailsthrough pop-upsthrough spywarethrough bugs45s
- Q10In the discussion, these pose like a software that you willingly download and install, but are threats to data.Internet FraudVirusTrojan horseCybercrime45s
- Q11This is a threat to data wherein attackers, try to launch so many requests to a public server so legit users will have a difficulty accessing it.DDOSInternet FraudTrojan horseCybercrime45s
- Q12This threat to data is nationwideInternet FraudCyber terrorismDDOSCybercrime45s
- Q13
This term belongs to thieves trying to get your information through links sent to you via SMS, email, QR codes, etc.
Users re-arrange answers into correct orderJumble45s - Q14
What three-lettered acronym pertains to a code you receive through SMS or email that helps you safely log in / do online transactions?
Users enter free textType an Answer45s - Q15
What three-lettered acronym pertains to security code on the back of your credit/ debit cards?
Users enter free textType an Answer30s