Search Header Logo
Yr8 Cybersecurity L1 L2 Homework

Yr8 Cybersecurity L1 L2 Homework

Assessment

Presentation

•

Computers

•

6th Grade

•

Practice Problem

•

Medium

Created by

A Williams

Used 4+ times

FREE Resource

77 Slides • 19 Questions

1

media

2

media

3

Fill in the Blank

What is the word for a law, or set of laws passed by Parliament?

4

media

5

media

6

media

7

media

8

Multiple Choice

What is the difference between data and information?

1

Data is structured information

2

Information is raw facts, data is information that has been given meaning.

3

Data is facts and figures, information is data that has been given meaning.

4

Information is unprocessed data

9

media

10

media

11

Multiple Select

Select all the examples of personal data

1

Profile picture

2

Current location

3

Number of cats in your neighbourhood

4

Email address

12

media

13

Multiple Choice

What would be a good advert for Izzy?

1

Top Dog

Pet supplies recommended by vets

2

Outdoor Supplies

Everything you need for camping and hiking under one roof

3

School Uniform Bargains

Pre-loved uniforms at great prices

4

UK PC Parts

Best prices

Reviews

Exchange

14

media

15

media

16

media

17

media

18

Multiple Select

How do you benefit from personal data collected about you by companies? Select all that are correct

1

Relevant recommendations

2

Improved internet security

3

Personalised ads and offers

4

More relevant and engaging experience with app

19

media

20

media

21

Multiple Select

How do companies benefit from the personal data you provide them? Select all the correct answers.

1

They can sell the data to other companies

2

They can target advertisements at the right people at the right time

3

They can improve their product

4

They can understand their customers better

22

media

23

media

24

media

25

media

26

media

27

Multiple Select

Which of these are consequences of a cybercriminal getting your personal data?

1

Data used to commit cybercrimes

2

Identity theft

3

Computer will not operate

4

Data sold to companies

28

media

29

media

30

media

31

media

32

Multiple Select

Which of these are consequences of a cybercriminal getting your personal data?

1

Data used to commit cybercrimes

2

Identity theft

3

Computer will not operate

4

Data sold to companies

33

Multiple Choice

What is the term for when someone uses your data to pretend to be you?

1

Identity duplication

2

Personality theft

3

Identity theft

4

Fraud identity

34

media

35

media

36

media

37

media

38

media

39

media

40

media

41

media

42

media

43

media

44

media

45

media

46

Multiple Choice

Which one is NOT a principle of the Data Protection Act?

1

A reason must be given for collecting personal data

2

Only data for the purpose stated can be collected, no other data

3

The personal data must be kept forever

4

Data must be protected from hacking

47

Multiple Select

Select all the correct principles of the Data Protection Act

1

Data collected must be accurate

2

Data must be deleted after a month

3

A reason must be given for collecting personal data

4

Data must include the users name and email address

48

Multiple Choice

Which of the following is a violation of the Data Protection Act?

1

Using data for a different purpose than originally stated

2

Asking the user for personal data

3

Storing personal data

4

Using data to provide adverts that the user will like

49

media

50

media

51

media

52

media

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

media

61

Multiple Choice

What is the main goal of social engineering?

1

to improve user experience

2

to trick people into revealing information

3

to enhance data security

4

to develop new software

62

Multiple Select

Which are common social engineering approaches? Select all that are correct.

1

Trying to scare you into doing something

2

Pretending to be your friend or to need your help

3

Offering you something nice you might like

4

Hacking your computer to put a virus on it

63

media

64

media

65

media

66

media

67

media

68

media

69

media

70

media

71

media

72

media

73

media

74

media

75

media

76

media

77

Multiple Choice

What is blagging in the context of social engineering?

1

a method of inventing scenarios to obtain data

2

a type of encryption

3

a software vulnerability

4

a secure data protocol

78

Multiple Choice

What is the term for the act of secretly observing someone enter private information, such as a PIN or password?

1

Shouldering

2

Phishing

3

Blagging

4

Name generator attack

79

Multiple Choice

What is phishing?

1

Watching someone type in their username and password

2

A fake message that tricks you into giving personal data by clicking on a link

3

A virus that copies all your personal information

4

Searching social media accounts for personal information

80

Multiple Select

Which one of these are characteristics of a phishing email? You can choose more than one.

1

Unexpected email with request for information that does not use your name

2

Creates as sense of urgency

3

Comes from one of your known contacts

4

Suspicious hyperlinked web address

81

media

82

media

83

media

84

media

85

media

86

media

87

media

88

media

89

media

90

media

91

media

92

media

93

media

94

media

95

Multiple Choice

What is a key strategy to prevent falling victim to social engineering?

1

ignoring all technology

2

regularly updating software

3

being aware of common tactics

4

using the same password everywhere

96

media
media

Show answer

Auto Play

Slide 1 / 96

SLIDE