• 1. 
    What is Spam?

  • Canned meat.
  • Unsolicited emails sent to many email addresses that try to get you buy something or share private information.
  • A computer virus that will hack your account.
  • None of these
  • 2. 
    Who should know your passwords?

  • Only you!
  • Your best friends
  • Anyone
  • 3. 
    A malware program that, when executed, replicates by inserting copies of itself into other computer programs is known as?

  • Covid-19
  • Virus
  • Spoofing
  • Rhinovirus
  • 4. 
    The attempt to acquire sensitive information such as usernames, passwords, and credit card details by pretending you are a trustworthy entity in an electronic communication is known as?

  • Converting
  • Hacking
  • Phishing
  • Fishing
  • 5. 
    When visiting a website, you notice a lock icon in the lower-right corner of the browser window. What does the lock represent?

  • A link to open another site
  • A webpage that has a secure connection
  • A program that prevents you from leaving the page
  • A warning that you are not allowed to view this webpage
  • 6. 
    To keep your browser private, you can use the _______ mode.

  • incognito
  • confidential
  • encrypted
  • deception
  • 7. 
    What is Ransomware

  • A Disease you get from playing to much Fortnite
  • A type of malware that wants Money
  • An Anti Virus Software
  • Software that protects you from Phishing
  • 8. 
    You can erase your digital footprint.

  • True
  • False
  • 9. 
    Which of these indicates a website is secure?

  • You found the website on Google or clicked it from a link in an email.
  • A little lock icon next to the website address.
  • The website shows a company name and logo and looks real.
  • 10. 
    An online shopping website want to track user purchase. The website commonly user data file to store purchasing history. These files are commonly know as:

  • Cookie
  • Widgets
  • script
  • logs
  • 11. 
    Which of the following best describes a Trojan Horse

  • Malicious software that misleads users of its intent, which is to allow unauthorised access to your system
  • Malicious software that replicates itself and spreads through your network to steal data
  • Malicious software that it usually attached to an email and sends itself around a network to allow unauthorised access to your system
  • Malicious software that sets your computer on fire
  • 12. 
    Software that aims to gather information about a person or organization without their knowledge?

  • Spyware
  • Spam
  • Trojan Horse
  • Fishing
  • 13. 
    A computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

  • Ethical hacker
  • Programer
  • Social Engineer
  • 14. 
    ____ also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.

  • Cyber Security
  • Cyber Etiquette
  • Cyber Warfare
  • 15. 
    What is one of the most popular online activities-and one that poses the greatest risk to your privacy?

  • quizizz
  • Examview
  • Granville Gmail
  • social networking
  • 16. 
    The technology, process or people that protect networks and devices from attack, damage, or unauthorized access

  • Cyber Security
  • White Hat Hacker
  • Domain Name Server
  • All of the above
  • 17. 
    Unsolicited electronic messages, especially advertising is know as?

  • Spim
  • Spam
  • Ransomware
  • 18. 
    General name of computer software designed to cause damage to your electronic device.

  • Dangerbots
  • Problemware
  • Malware
  • Hyperlinks
  • 19. 
    A network security device that monitors incoming and outgoing network traffic and decides whether it is safe.

  • Anti-virus
  • Firewall
  • Encryption
  • Malware
  • 20. 
    Which is NOT a type of malware?

  • Virus
  • Worm
  • Trojan horse
  • Sandwich
  • 21. 
    What is the best way to monitor your online profile?

  • use password manager
  • Google yourself
  • ask your friends to tell you what you see
  • make sure you have all of your personal information visible
  • 22. 
    What should you do if you think you have been hacked?

  • Report the problem to the school or teacher
  • Change your password
  • Tell your parents or an adult
  • All of the above
  • 23. 
    A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed is known as?

  • Ransomware
  • Virus
  • Spim
  • Spam
  • 24. 
    A set of rules for appropriate behavior while on the internet.

  • Identity
  • Netiquette
  • Social Network
  • Dossier
  • 25. 
    How do we tighten our security?

  • Use strong password
  • Use firewalls
  • Log-off personal account when not in use
  • Update anti-virus software
  • All of the above
  • 26. 
    Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems is known as?

  • Malware
  • Operating System
  • Device Driver
Report Question
warning
access_time
  Time