Search Header Logo
Cyber Security Lesson 5

Cyber Security Lesson 5

Assessment

Presentation

•

Computers

•

10th Grade

•

Medium

Created by

Jacque Mitchard

Used 17+ times

FREE Resource

23 Slides • 17 Questions

1

Cyber Security Lesson 5

Slide image

2

Slide image

3

Multiple Choice

How can you protect against spyware?
1
Install, Scan and delete spyware with a program like lavasoft
2
Don't open email attachments

4

Multiple Choice

How can a trojan infect your pc?
1
On memory sticks.
2
Through email attachments.
3
By being disguised as legitimate software.
4
Dodgy web links

5

Multiple Choice

What is the difference between a virus and a worm?
1
A virus needs human intervention, a worm doesn't
2
A virus deletes files, whereas a worm doesn't.

6

Slide image

7

Slide image

8

Multiple Choice

How does a computer virus infect a pc?
1
Email attachments
2
Attached to files on memory sticks
3
Suspicious web links
4
All of the above

9

Slide image

10

Slide image

11

Slide image

12

Slide image

13

Multiple Choice

What does it mean to follow copyright rules?
1
Copy exactly what you see
2
Site work appropriately that isn't your own
3
Write down a list of rules
4
Send emails to your friends

14

Multiple Choice

What does A.U.P. stand for?
1
Awesome User Profile
2
Acceptable Use Policy
3
Acceptable User Password
4
Any Unit Password

15

Slide image

16

Slide image

17

Slide image

18

Slide image

19

Multiple Choice

What would be the best way to transform "unicorn" into a password?

1

Un!corn

2

un!corN10

3

unicorn7

4

Ms. Unicorn

20

Multiple Choice

What does a safe password look like?

1

4 to 6 lowercase letters

2

6-8 numbers, symbols, and letters

3

2 letters

4

No password

21

Multiple Choice

Which one of the following is a strong password?

1

Sian1234

2

Rover!

3

Da1syTh3C0w!

4

4576nine

22

Slide image

23

Slide image

24

Multiple Choice

What is Backing Storage?

1

Data storage that will retain a computer's data even after the computer is powered off

2

Storage you can only get online

3

A USB stick

4

A CD or DVD

25

Multiple Select

Select all of the backing storage devices

1
2
3
4

26

Slide image

27

Slide image

28

Slide image

29

Slide image

30

Multiple Choice

Which option is not somethings that should be done after an attack?

1

Investigate

2

Respond

3

Report

4

Recover

5

Analyse

31

Slide image

32

Slide image

33

Slide image

34

Slide image

35

Slide image

36

Multiple Choice

True or False: Sam Slate's password is "sammyslate". This is a great password because it has a lot of letters.

1

true

2

false

37

Multiple Choice

Create a password you can remember.

1

Do

2

Don't

38

Multiple Choice

Use your nickname as your password.

1

Do

2

Don't

39

Multiple Choice

Use dictionary words as your password.

1

Do

2

Don't

40

Multiple Choice

Use dictionary words as your password.

1

Do

2

Don't

Cyber Security Lesson 5

Slide image

Show answer

Auto Play

Slide 1 / 40

SLIDE