Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
An email message with a request for you to Click Here is probably
a Trojan Horse
a Phishing attack
A White Hat Hacker
Scareware
Internet Addiction
Authentication
a Black Hat Hacker
All of the above
If you have _______________________ you may suffer from Myopia, social incompetence, or have difficulty sleeping
a Trojan Horse
a Phishing attack
A White Hat Hacker
Scareware
Internet Addiction
Authentication
a Black Hat Hacker
All of the above
You work for a transportation company and want to protect your systems from harm. Who might you hire to help you?
a Trojan Horse
a Phishing attack
A White Hat Hacker
Scareware
Internet Addiction
Authentication
a Black Hat Hacker
All of the above
You receive an email from Nyntundo saying You Must Be 13 To Play This Game Online. Click on your age from the available links below. This is probably
a Trojan Horse
a Phishing attack
A White Hat Hacker
Scareware
Internet Addiction
Authentication
a Black Hat Hacker
All of the above
When you log in to a computer or device using a username, password, fingerprint, face ID, or other method, the process that is used to verity your identity is called _______________.
a Trojan Horse
a Phishing attack
A White Hat Hacker
Scareware
Internet Addiction
Authentication
a Black Hat Hacker
All of the above
You receive a notification that you have won a free game and instructions to click on the link to download it. This could be an example of
a Trojan Horse
a Phishing attack
A White Hat Hacker
Scareware
Internet Addiction
Authentication
a Black Hat Hacker
All of the above
If your computer gets hacked and you have a computer virus that might spread to others in your network what might you do?
a Trojan Horse
a Phishing attack
A White Hat Hacker
Scareware
Internet Addiction
Authentication
a Black Hat Hacker
All of the above
You receive a pop up message on your screen saying that you have a Trojan Horse virus, but if you click here to download this software it will be removed. This is
a Trojan Horse
a Phishing attack
A White Hat Hacker
Scareware
Internet Addiction
Authentication
a Black Hat Hacker
All of the above
Check it!