Search Header Logo
Cyber Security Lesson 1

Cyber Security Lesson 1

Assessment

Presentation

•

Computers

•

10th Grade

•

Medium

Created by

Jacque Mitchard

Used 98+ times

FREE Resource

23 Slides • 16 Questions

1

Cyber-Security

Lesson 1

media

2

media

3

Multiple Choice

CPL

Which is the most appropriate definition of a hacker?

1

Is someone who gains unauthorised access to an IT system such as a computer, website or email account.

2

Someone who accesses your home without your permission.

4

media

5

Multiple Choice

Question image

Which is the best definition of a black hat hacker?

1

Someone who breaks into computer systems to test out their security

2

Someone who breaks into computer systems for the government

3

Someone who breaks into computers systems to cause damage or make money

4

Someone who breaks into computer systems without getting caught

6

Multiple Choice

Why do people hack into computers?

1

Fun/challenge

2

Personal attack

3

Industrial Espionage

4

Revenge

5

All of the above

7

media

8

media

9

media

10

media

11

Multiple Choice

Question image

What is Malware?

1

Bad computer equipment

2

Pop up adverts on your computer

3

Software designed to do harm to a computer

4

Fake web sites

12

media

13

media

14

Multiple Choice

What is a worm?
1
Malware that copies to other PCs across a network
2
A creature stuck inside your pc case
3
A virus
4
A virus that enters into your system via another file

15

media

16

media

17

Multiple Choice

What is ransomware?

1

a hoax

2

a computer virus that closes/blacks access the victim's social media accounts unless a ransom is paid.

3

a type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

4

a new app for shopping

18

media

19

media

20

media

21

Multiple Choice

What does DDoS Stand for?
1
Distributed Denial of Service
2
Delayed Destruction of Server
3
Delayed Denial of Style
4
Delayed Denial of Service

22

media

23

Multiple Choice

What do DDoS attacks use?

1

Zombie devices

2

Ghost PCs

3

Worms

4

SD Cards

24

media

25

Multiple Choice

What is a virus?
1
Malware hidden in another file
2
Any type of malware
3
A cookie
4
A breed of gecko

26

media

27

media

28

Multiple Choice

A hacker who misuses computers is know as a....?

1

White Hat hacker

2

Hacker

3

Cyber Criminal

4

Black Hat hacker

29

media

30

media

31

media

32

Multiple Choice

Which option below is not a reason attackers hack systems?

1

Financial Gain

2

Industrial Espionage

3

Personal attacks

4

Training

33

media

34

media

35

Multiple Choice

You received an e-mail message from someone you don't know. The e-mail requests you to click a link and provide some information. It says that in exchange, you will receive access to a site that offers incredible deals on popular items, up to 90 percent off retail cost. This offer sounds too good to be true. What type of security threat have you encountered?

1

Phishing

2

Virus

3

Trojan

4

Pharming

36

Multiple Choice

Which option below is NOT malware

1

Virus

2

Spyware

3

Trojian

4

Firewalls

37

Multiple Choice

Malicious Software is also known as?

1

Anti-Virus

2

Firewall

3

Malware

4

Attacks

38

Multiple Choice

Which of the following people should you share your password with when they ask?

1

Network managers

2

Call centre workers

3

Security experts

4

Company managers

5

Nobody

39

Multiple Choice

Which of the following is not a social engineering technique?

1

Blagging

2

Hacking

3

Phishing

4

Pharming

Cyber-Security

Lesson 1

media

Show answer

Auto Play

Slide 1 / 39

SLIDE