Internet Risks Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes cyberbullying?

  • Stealing personal information to assume someone's identity
  • Intentionally abusing, harassing, and mistreating someone using electronic communication (correct)
  • Sending sexually explicit text messages, images, and videos
  • Using electronic communication to stalk or harass individuals or groups

What is the definition of identity theft?

  • Stealing personal information to assume someone's identity (correct)
  • Sending sexually explicit text messages, images, and videos
  • Using electronic communication to stalk or harass individuals or groups
  • Intentionally abusing, harassing, and mistreating someone using electronic communication

What does cyber stalking involve?

  • Intentionally abusing, harassing, and mistreating someone using electronic communication
  • Stealing personal information to assume someone's identity
  • Sending sexually explicit text messages, images, and videos
  • Using electronic communication to stalk or harass individuals or groups (correct)

Which type of malware disguises itself as a legitimate program and takes control of your computer?

<p>Trojan Horse (C)</p> Signup and view all the answers

What type of malware replicates itself by copying itself to another program?

<p>Virus (A)</p> Signup and view all the answers

Which type of malware gathers information from a victim's computer and sends it back to the hacker?

<p>Spyware (A)</p> Signup and view all the answers

What type of malware spreads to other computers by copying itself?

<p>Worm (B)</p> Signup and view all the answers

Which type of malware runs in the background and records every keystroke made by the user?

<p>Keylogger (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Cybersecurity: Phishing and Malware Types
40 questions
Cybersecurity: Phishing and Malware
16 questions

Cybersecurity: Phishing and Malware

UserReplaceableOpossum5257 avatar
UserReplaceableOpossum5257
Cybersecurity: Viruses and Malware
15 questions

Cybersecurity: Viruses and Malware

DignifiedEiffelTower9877 avatar
DignifiedEiffelTower9877
Use Quizgecko on...
Browser
Browser