Search Header Logo
Computer Security Basics BCS_Revised

Computer Security Basics BCS_Revised

Assessment

Presentation

Computers

6th - 8th Grade

Practice Problem

Medium

Created by

J Holland

Used 5+ times

FREE Resource

27 Slides • 19 Questions

1

media

2

media

3

Multiple Choice

Which of the following is a common type of cyber attack?

1

Phishing

2

Defragmentation

3

Disk Cleanup

4

Software Update

4

media

5

media

6

Multiple Choice

Which of the following best describes malware?

1

A type of software designed to intentionally harm or damage a computer or network.

2

A software that helps protect your computer from viruses.

3

A program that increases your computer's speed.

4

A tool used to back up important files.

7

media

8

Multiple Select

Which of the following are common ways malware can infect a computer?

1

Downloading infected software

2

Opening infected emails

3

Using removable media like USBs

4

Updating antivirus software

9

Open Ended

List and explain two common ways that computers can become infected with malware.

10

media

11

media

12

Open Ended

How does the analogy of a computer virus and the flu help explain how viruses spread between computers?

13

Fill in the Blanks

Type answer...

14

media

15

media

16

media

17

media

18

media

19

media

20

media

21

media

22

media

23

media

24

Multiple Choice

What is one visual clue in the email example that suggests it may not be from a legitimate company?

1

The use of a well-known company logo

2

A personalized greeting

3

A generic message and incorrect logo

4

A detailed order summary

25

Fill in the Blanks

Type answer...

26

Open Ended

Based on the email examples provided, list at least two features that make an email appear suspicious or 'phishy.'

27

Multiple Choice

Which of the following is a sign that an email might be a phishing attempt, as shown in the example?

1

Professional grammar and punctuation

2

A sender address from an official company domain

3

A sense of urgency requiring immediate action

4

Personalized greeting with your name

28

media

29

media

30

media

31

Open Ended

Why is it important to update the software and apps on your computer and phone regularly?

32

Multiple Select

Which of the following are recommended ways to prevent cyber attacks, according to the slides?

1

Install and update anti-virus software

2

Ignore software updates

3

Update software and apps on your devices

4

Share passwords with friends

33

media

34

Multiple Choice

Which of the following is a primary function of a firewall in network security?

1

To monitor and filter incoming and outgoing network traffic

2

To increase internet speed

3

To store backup data

4

To provide wireless connectivity

35

media

36

Open Ended

Why is it important to scan removable media (such as USB drives) with a virus-checker before using them on your computer?

37

media

38

Multiple Choice

Which of the following actions can help prevent malware infections when using email or downloading software?

1

Only open emails from trusted sources

2

Download software from any website

3

Ignore security warnings

4

Share passwords through email

39

media

40

Fill in the Blanks

Type answer...

41

media

42

Multiple Select

Which of the following are recommended practices to prevent cyber attacks?

1

Install a firewall

2

Avoid using unscanned USB drives

3

Click on pop-up ads

4

Check for secure websites (https)

43

media

44

media

45

Open Ended

After learning about protecting your computer, what is one question you still have or something you would like to know more about?

46

Open Ended

What is one common cyber attack you learned about in this lesson, and how can you avoid it?

media

Show answer

Auto Play

Slide 1 / 46

SLIDE