Search Header Logo
Cyber Security Lesson 4

Cyber Security Lesson 4

Assessment

Presentation

Computers

10th Grade

Medium

Created by

Jacque Mitchard

Used 28+ times

FREE Resource

15 Slides • 15 Questions

1

Cyber Security Lesson 4

media

2

​TIPS

​How to recognise different types of Malware how to protect your data both physically and digitally

3

Multiple Choice

Programs that look useful, but cause damage to your computer
1
phishing
2
spyware
3
worms
4
trojans

4

Multiple Choice

Special types of viruses that can travel from computer to computer without human action; self-replicating and can multiply until it uses up the computer's resources
1
spyware
2
worms
3
trojans
4
phishing

5

media

6

media

7

media

8

Multiple Choice

Definition of encryption

1

Using an algorithm and a key to convert message data into a form that is not understandable without that key.

2

A method of trying to find the plain text from the cipher text without the decryption key.

3

Process of turning legible text into gobbledygook.

4

Using an algorithm and a key to convert encrypted message data into its plain text equivalent.

9

Multiple Choice

It is a software used to prevent, detect and remove destructive programs in a computer.

1

Anti-Spyware

2

Anti-Malware

3

Anti-Virus

4

Anti-Phishing

10

media

11

media

12

media

13

Multiple Choice

What does Firewall Do?
1
Prevents Hackers
2
Install Viruses
3
Give you SD cards
4
Blocks all content

14

media

15

media

16

media

17

Multiple Choice

Special program which can detect and remove viruses from computer is called

1

Virus

2

Anti virus

3

Group ware

4

Custom

18

Multiple Choice

What type of warning are you most likely to receive if a virus is found on your system?

1

The computer will shut itself down

2

A siren will sound and continue until the virus is removed

3

Your anti-virus software will display a message and ask you how to proceed

19

media

20

media

21

media

22

Multiple Choice

Using an unsecured network is sometimes unavoidable, which one of the following describes how confidential information should be sent in that situation?

1

In a compressed only format.

2

In an encrypted format.

3

In an unsigned email.

4

As quickly as possible.

23

Multiple Choice

The process of converting a ciphertext into plaintext.

1

encryption

2

decryption

3

plaintext

4

cryptography

24

media

25

Multiple Choice

Which of these indicates a website is secure?

1

You found the website on Google or clicked it from a link in an email.

2

A little lock icon next to the website address.

3

The website shows a company name and logo and looks real.

26

Multiple Choice

What is AntiVirus software?

1

Software that blocks all unwanted ads.

2

Software that keeps you from getting sick.

3

Software that protects your device from viruses and malware.

27

Multiple Choice

Qwerty123 is a Strong Password (i.e. not a cyber security risk)

1

True

2

False

28

Multiple Choice

Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access

1

True

2

False

29

Multiple Choice

Which one of the following is NOT a type of CyberSecurity Attack?

1

Worms

2

Randsomware

3

Spyware

4

Password Management

30

Multiple Choice

Which one of the following is NOT a type of CyberSecurity Attack?

1

Worms

2

Randsomware

3

Spyware

4

Password Management

Cyber Security Lesson 4

media

Show answer

Auto Play

Slide 1 / 30

SLIDE