Search Header Logo
Introduction to Cyber Security

Introduction to Cyber Security

Assessment

Presentation

Computers

7th Grade

Practice Problem

Medium

Used 14+ times

FREE Resource

36 Slides • 16 Questions

1

media

2

media

3

media

4

media

5

Multiple Choice

Digital Security includes tools to secure your identity, assets, and technology in the online and mobile world.

1

True

2

False

6

media

7

Multiple Choice

Your Digital Footprint is not affected by the emails you send.

1

True

2

False

8

media

9

Multiple Choice

Cookies are large files stored on a user’s computer.

1

True

2

False

10

media

11

Multiple Choice

Which of the following is NOT a type of malware?

1

Trojan horse

2

Worm

3

Adware

4

Firewall

12

media

13

Multiple Choice

People write malware only for criminal activity.

1

True

2

False

14

media

15

Multiple Choice

One of the goals of malware is to gather data about you and what you do/like.

1

True

2

False

16

media

17

Multiple Choice

What do phishing scams attempt to do?

1

Sell you products at a discount.

2

Trick you into giving out personal information.

3

Improve your computer's performance.

4

Provide free software updates.

18

media

19

media

20

media

21

media

22

media

23

media

24

media

25

media

26

media

27

media

28

media

29

media

30

media

31

media

32

media

33

media

34

media

35

Multiple Choice

Which of the following statements about online information is correct?

1

Online information is always accurate.

2

Online information is always unreliable.

3

Online information should always be verified for accuracy.

4

Online information is always provided by experts.

36

media

37

Multiple Choice

What is a digital footprint?

1

A type of malware.

2

A trail of data you create while using the Internet.

3

A physical mark left by a computer mouse.

4

A password encryption method.

38

media

39

Multiple Choice

How can information about you be tracked?

1

Through your technological devices.

2

Only through handwritten documents.

3

Information cannot be tracked online.

4

Through verbal conversations.

40

media

41

Word Cloud

How can we protect ourselves? (Brainstorm below)

42

media

43

Multiple Choice

Which of the following is a way to keep safe online?

1

Using simple passwords.

2

Sharing your passwords with friends.

3

Using a strong password.

4

Writing your passwords on a sticky note.

44

media

45

Multiple Choice

What happens when you reply to SPAM emails?

1

Your email address remains private.

2

Your email address is confirmed as valid.

3

You receive fewer SPAM emails.

4

Your computer's performance improves.

46

media

47

Multiple Choice

What makes a strong password?

1

Using only lowercase letters.

2

Using combinations of upper and lower case letters, characters, and numbers.

3

Using your name or birthdate.

4

Using common words found in the dictionary.

48

media

49

Multiple Choice

When should backups be performed?

1

After downloading new software.

2

Shortly after completing a virus scan.

3

When your computer crashes.

4

Only when you remember.

50

media

51

Multiple Choice

Which of the following is not recommended for staying secure online?

1

Using strong passwords.

2

Pirating software to avoid paying for it.

3

Making frequent backups.

4

Avoiding replying to SPAM emails.

52

media
media

Show answer

Auto Play

Slide 1 / 52

SLIDE

Discover more resources for Computers