Internet Risks Quiz
8 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes cyberbullying?

  • Stealing personal information to assume someone's identity
  • Intentionally abusing, harassing, and mistreating someone using electronic communication (correct)
  • Sending sexually explicit text messages, images, and videos
  • Using electronic communication to stalk or harass individuals or groups

What is the definition of identity theft?

  • Stealing personal information to assume someone's identity (correct)
  • Sending sexually explicit text messages, images, and videos
  • Using electronic communication to stalk or harass individuals or groups
  • Intentionally abusing, harassing, and mistreating someone using electronic communication

What does cyber stalking involve?

  • Intentionally abusing, harassing, and mistreating someone using electronic communication
  • Stealing personal information to assume someone's identity
  • Sending sexually explicit text messages, images, and videos
  • Using electronic communication to stalk or harass individuals or groups (correct)

Which type of malware disguises itself as a legitimate program and takes control of your computer?

<p>Trojan Horse (C)</p> Signup and view all the answers

What type of malware replicates itself by copying itself to another program?

<p>Virus (A)</p> Signup and view all the answers

Which type of malware gathers information from a victim's computer and sends it back to the hacker?

<p>Spyware (A)</p> Signup and view all the answers

What type of malware spreads to other computers by copying itself?

<p>Worm (B)</p> Signup and view all the answers

Which type of malware runs in the background and records every keystroke made by the user?

<p>Keylogger (B)</p> Signup and view all the answers

More Like This

Cybersecurity: Gray Hat Hackers and Malware
10 questions
Cybersecurity: Phishing and Malware Types
40 questions
Cybersecurity: Phishing and Malware
16 questions

Cybersecurity: Phishing and Malware

UserReplaceableOpossum5257 avatar
UserReplaceableOpossum5257
Use Quizgecko on...
Browser
Browser