Search Header Logo
Cyber Security Lesson

Cyber Security Lesson

Assessment

Presentation

Computers

KG

Practice Problem

Medium

Created by

O. Okuwa

Used 3+ times

FREE Resource

81 Slides • 62 Questions

1

Cyber Security

Hey everyone,

Today we are going to learn about cyber security in preparation for our next IT Unit in Module 5.

media

2

Virus

A computer virus is a term used to describe software that can wreak havoc on your device.

media

3

Multiple Choice

What is the term for computer programs that can wreak havoc on your device?

1

Virus

2

Software

3

Computer

4

Digita;

4

Multiple Choice

Can anyone tell me what they think spyware is?

1

When someone uses your phone

2

A spy movie

3

A criminal

4

Software that collects data from your device

5

Spyware

Spyware is software that collects information from your device. This means that it can collect details like passwords and card information.

The scary part is that you do not even know anything has been collected.

media

6

What is Phishing?

Yes I spelt that right, and no I did not mean 'Fishing'.

Phishing is when a criminal pretends to be an honest person working to get your personal information.

They pretend to be from a trustworthy source to get whatever information they can from you.

media

7

Multiple Choice

What is Phishing?

1

The wrong spelling of the word fishing

2

A criminal who goes on a boat to find data in the sea

3

When someone acts like a trustworthy source to steal your information.

4

A bug that can get into your home

8

Multiple Choice

Which one of these is an example of a phishing email?

1

You won a new phone, click here to claim it.

2

You have a rich family member who wants to share their money. Click here to get yours.

3

Help I am stuck in a foreign country and I need some money to get back home.

4

All of the above

9

Fire Wall

A fire wall is software that monitors what happens online and protects your device from people that try to get into your computer or put bad software onto your computer.

media

10

Multiple Choice

What software can we use to protect our device from hackers?

1

Fortnite

2

Firewall

3

Microsoft Office

4

Google Chrome

11

Anti-Virus Software

Anti-Virus software is software that protects your device from software that wants to steal information or harm your computer.

media

12

Multiple Choice

What is Anti-Virus Software?

1

Software that protects you from all animals

2

Software that protects your device

3

Software that tells you when its time to rest so you don not get sick

4

Software that protects your roof

13

Multiple Choice

When should you get Anti-Virus Software.

1

When you are sick

2

If you are a doctor helping someone who is sick

3

When you get a new device

4

When it is time for you to rest

14

Cyber-Security

Lesson 1

media

15

media

16

media

17

Multiple Choice

Which is the most appropriate definition of a hacker?

1

Is someone who gains unauthorised access to an IT system such as a computer, website or email account.

2

Someone who accesses your home without your permission.

18

Multiple Choice

Why do people hack into computers?

1

Fun/challenge

2

Personal attack

3

Industrial Espionage

4

Revenge

5

All of the above

19

Multiple Choice

Question image

Which is the best definition of a black hat hacker?

1

Someone who breaks into computer systems to test out their security

2

Someone who breaks into computer systems for the government

3

Someone who breaks into computers systems to cause damage or make money

4

Someone who breaks into computer systems without getting caught

20

media

21

media

22

media

23

media

24

media

25

Multiple Choice

Question image

What is Malware?

1

Bad computer equipment

2

Pop up adverts on your computer

3

Software designed to do harm to a computer

4

Fake web sites

26

media

27

Multiple Choice

What is a worm?
1
Malware that copies to other PCs across a network
2
A creature stuck inside your pc case
3
A virus
4
A virus that enters into your system via another file

28

media

29

media

30

Multiple Choice

What is ransomware?

1

a hoax

2

a computer virus that closes/blacks access the victim's social media accounts unless a ransom is paid.

3

a type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

4

a new app for shopping

31

media

32

media

33

media

34

media

35

Multiple Choice

What does DDoS Stand for?
1

Distributed Denial of Service

2

Delayed Destruction of Server

3

Delayed Denial of Style

4

Delayed Denial of Service

36

media

37

Multiple Choice

What do DDoS attacks use?

1

Zombie devices

2

Ghost PCs

3

Worms

4

SD Cards

38

Multiple Choice

What is a virus?
1

Malware hidden in another file

2

Any type of malware

3

A cookie

4

A breed of gecko

39

media

40

media

41

Multiple Choice

A hacker who misuses computers is know as a....?

1

White Hat hacker

2

Hacker

3

Cyber Criminal

4

Black Hat hacker

42

media

43

media

44

media

45

Multiple Choice

Which option below is not a reason attackers hack systems?

1

Financial Gain

2

Industrial Espionage

3

Personal attacks

4

Training

46

media

47

media

48

Multiple Choice

You received an e-mail message from someone you don't know. The e-mail requests you to click a link and provide some information. It says that in exchange, you will receive access to a site that offers incredible deals on popular items, up to 90 percent off retail cost. This offer sounds too good to be true. What type of security threat have you just encountered?

1

Phishing

2

Virus

3

Trojan

4

Pharming

49

Multiple Choice

Which option below is NOT malware

1

Virus

2

Spyware

3

Trojian

4

Firewalls

50

Multiple Choice

Malicious Software is also known as?

1

Anti-Virus

2

Firewall

3

Malware

4

Attacks

51

Multiple Choice

Which of the following people should you share your password with when they ask?

1

Network managers

2

Call centre workers

3

Security experts

4

Company managers

5

Nobody

52

Multiple Choice

Which of the following is not a social engineering technique?

1

Blagging

2

Hacking

3

Phishing

4

Pharming

53

Cyber Security Lesson 2

In this lesson, we will be learning about internal and external threats to organisations.

media

54

media

55

Multiple Choice

Who should know your passwords?

1

Only you!

2

Your best friends

3

Anyone

56

Multiple Choice

Which of these is NOT a good password?

1

#LooneyToons23

2

Ilovecats!95

3

password

4

#Iasw,aA!

57

Multiple Choice

What is the term for computer programs that attack your computer?

1

Malware

2

DangerDroids

3

RudeBots

4

Dangerware

58

media

59

media

60

media

61

Multiple Choice

Which of the following are activities that a hacker might attempt?
1
Stealing usernames and passwords
2
Modifying website content
3
Disrupting network communications
4
All of the above

62

Multiple Choice

Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?

1

True

2

False

63

media

64

media

65

media

66

media

67

Multiple Choice

What option below is NOT a security control?

1

Physical

2

Technical

3

Procedural

4

Legal

5

Environmental

68

media

69

media

70

Multiple Choice

Which option is NOT an impact of a security breach?

1

Data Loss

2

Damage to public image

3

Losing jobs

4

Reduction in productivity

5

Legal Action

71

Multiple Choice

What was seen as the fastest spreading email worm?

1

SoBig Worm

2

ILOVEYOU Worm

3

MyDoom Worm

72

media

73

media

74

media

75

Cyber Security Lesson 4

​In this lesson, you will be learning about security measures an organisation can use to protect its staff and systems.

media

76

media

77

Multiple Choice

Programs that look useful, but cause damage to your computer
1
phishing
2
spyware
3
worms
4
trojans

78

Multiple Choice

Special types of viruses that can travel from computer to computer without human action; self-replicating and can multiply until it uses up the computer's resources
1
spyware
2
worms
3
trojans
4
phishing

79

media

80

media

81

media

82

Multiple Choice

What is the definition of encryption?

1

Using an algorithm and a key to convert message data into a form that is not understandable without that key.

2

A method of trying to find the plain text from the cipher text without the decryption key.

3

Process of turning legible text into gobbledygook.

4

Using an algorithm and a key to convert encrypted message data into its plain text equivalent.

83

Multiple Choice

What is the software used to prevent, detect and remove destructive programs in a computer?

1

Anti-Spyware

2

Anti-Malware

3

Anti-Virus

4

Anti-Phishing

84

media

85

media

86

media

87

Multiple Choice

What does a Firewall Do?

1

Prevents Hackers

2

Install Viruses

3

Give you SD cards

4

Blocks all content

88

media

89

media

90

media

91

Multiple Choice

What is the special program which can detect and remove viruses from computer called?

1

Virus

2

Anti virus

3

Group ware

4

Custom

92

Multiple Choice

What type of warning are you most likely to receive if a virus is found on your system?

1

The computer will shut itself down

2

A siren will sound and continue until the virus is removed

3

Your anti-virus software will display a message and ask you how to proceed

93

media

94

media

95

media

96

Multiple Choice

Using an unsecured network is sometimes unavoidable, which one of the following describes how confidential information should be sent in that situation?

1

In a compressed only format.

2

In an encrypted format.

3

In an unsigned email.

4

As quickly as possible.

97

Multiple Choice

What is the process of converting a ciphertext into plaintext?

1

encryption

2

decryption

3

plaintext

4

cryptography

98

media

99

Multiple Choice

Which of these indicates a website is secure?

1

You found the website on Google or clicked it from a link in an email.

2

A little lock icon next to the website address.

3

The website shows a company name and logo and looks real.

100

Multiple Choice

What is AntiVirus software?

1

Software that blocks all unwanted ads.

2

Software that keeps you from getting sick.

3

Software that protects your device from viruses and malware.

101

Multiple Choice

Qwerty123 is a Strong Password (i.e. not a cyber security risk)

1

True

2

False

102

Multiple Choice

Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access

1

True

2

False

103

Multiple Choice

Which one of the following is NOT a type of Cyber Security Attack?

1

Worms

2

Randsomware

3

Spyware

4

Password Management

104

Cyber Security Lesson 5

​In this lesson, you will learn about who has responsibility for making sure systems are safe and protected and the requirements of good a disaster recovery policy.

media

105

media

106

media

107

media

108

media

109

media

110

Multiple Choice

How can you protect against spyware?
1

Install, Scan and delete spyware with a program like lavasoft

2

Don't open email attachments

111

Multiple Choice

How can a trojan infect your pc?
1
On memory sticks.
2
Through email attachments.
3
By being disguised as legitimate software.
4
Dodgy web links

112

Multiple Choice

What is the difference between a virus and a worm?
1
A virus needs human intervention, a worm doesn't
2
A virus deletes files, whereas a worm doesn't.

113

Multiple Choice

How does a computer virus infect a pc?
1
Email attachments
2
Attached to files on memory sticks
3
Suspicious web links
4
All of the above

114

media

115

media

116

Multiple Choice

What does it mean to follow copyright rules?
1
Copy exactly what you see
2
Site work appropriately that isn't your own
3
Write down a list of rules
4
Send emails to your friends

117

Multiple Choice

What does A.U.P. stand for?
1
Awesome User Profile
2
Acceptable Use Policy
3
Acceptable User Password
4
Any Unit Password

118

media

119

media

120

media

121

media

122

Multiple Choice

What would be the best way to transform "unicorn" into a password?

1

Un!corn

2

un!corN10

3

unicorn7

4

Ms. Unicorn

123

Multiple Choice

What does a safe password look like?

1

4 to 6 lowercase letters

2

6-8 numbers, symbols, and letters

3

2 letters

4

No password

124

Multiple Choice

Which one of the following is a strong password?

1

Sian1234

2

Rover!

3

Da1syTh3C0w!

4

4576nine

125

media

126

media

127

Multiple Choice

What is Backing Storage?

1

Data storage that will retain a computer's data even after the computer is powered off

2

Storage you can only get online

3

A USB stick

4

A CD or DVD

128

Multiple Select

Select all of the backing storage devices

1
2
3
4

129

media

130

media

131

media

132

media

133

Multiple Choice

Which option is not somethings that should be done after an attack?

1

Investigate

2

Respond

3

Report

4

Recover

5

Analyse

134

media

135

media

136

media

137

media

138

media

139

Multiple Choice

True or False: Sam Slate's password is "sammyslate". This is a great password because it has a lot of letters.

1

true

2

false

140

Multiple Choice

Create a password you can remember.

1

Do

2

Don't

141

Multiple Choice

Use your nickname as your password.

1

Do

2

Don't

142

Multiple Choice

Use dictionary words as your password.

1

Do

2

Don't

143

Multiple Choice

Use dictionary words as your password.

1

Do

2

Don't

Cyber Security

Hey everyone,

Today we are going to learn about cyber security in preparation for our next IT Unit in Module 5.

media

Show answer

Auto Play

Slide 1 / 143

SLIDE