Search Header Logo
Cybersecurity

Cybersecurity

Assessment

Presentation

Computers

9th Grade

Medium

Created by

Deborah Harris

Used 19+ times

FREE Resource

1 Slide • 9 Questions

1

By Deb Har

media

Cybersecurity

2

Multiple Choice

Network Know-How

What is a network in this video?

1

Interconnected computers or devices

2

A super computer

3

A computer vulnerability

4

An Internet service provider

5

All of the above

3

Multiple Choice

Over-Sharing

What did the identity-theft crime ring use Tim’s photo for?

1

To create a Tim-like disguise

2

To make a counterfeit passport

3

They sent it in spam emails to Tim’s friends

4

To figure out Tim’s address

4

Multiple Choice

Behind the Scenes

Which of these is regularly used for secure online communication?

1

Caesar cipher

2

Public-key cryptography

3

Morse code

4

Enigma code

5

Multiple Choice

Encrypted Websites

How can you tell if a website encrypts its traffic?

1

Google it.

2

Look for the lock symbol in a URL.

3

All websites encrypt their traffic.

4

Encrypted sites take longer to load

6

Multiple Choice

Trust

What can you trust to be secure 100 percent of the time?

1

Text messages

2

Emails

3

Browser history

4

Apps

5

None of these

7

Multiple Choice

Hacker Motive

Why do hackers hack?

1

To make discoveries

2

To protect information

3

To steal information and money

4

To expose corruption

5

All of the above

8

Multiple Choice

Bike Hacks

Which of these is not a hack?

1

Using a bicycle to power a computer

2

Stealing an unlocked bicycle

3

Building a working bicycle out of discarded umbrellas

4

Creating a kinetic bicycle sculpture

9

Multiple Choice

Here to Stay

Why are cyber vulnerabilities unlikely to ever go away?

1

The government won’t allow people to fix them.

2

Criminals need them to steal identities

3

They are side effects of the freedom and ease of communicating online.

4

They’re protected in a secret base on the moon.

10

Multiple Choice

Taking Advantage

Which of these groups exploits cyber vulnerabilities?

1

Criminals

2

Governments

3

Hacktivists

4

All of the above

By Deb Har

media

Cybersecurity

Show answer

Auto Play

Slide 1 / 10

SLIDE