

cyber again
Presentation
•
Computers
•
8th Grade
•
Practice Problem
•
Medium
J Pearson
Used 1+ times
FREE Resource
39 Slides • 27 Questions
1
2
3
Multiple Choice
Why is it important to protect data from cyberattacks?
Because data is valuable and can be exploited
Because it is required by law
Because it is expensive to store data
Because it is difficult to recover lost data
4
5
Multiple Choice
What is the difference between data and information?
Data is processed and meaningful, while information is raw facts and figures.
Data is raw facts and figures, while information is processed and meaningful.
Data and information are the same.
Information is always numerical, while data is always textual.
6
7
Open Ended
Why is customer data valuable to businesses?
8
9
Open Ended
How do social media companies make money if they are free to use?
10
Multiple Select
Which of the following types of data might social media companies collect?
Personal info such as name and date of birth
Content like images and status updates
User behaviour such as pages visited
All of the above
11
12
Fill in the Blanks
Type answer...
13
14
15
Multiple Choice
What is social engineering in the context of cybersecurity?
A technical method to protect data
A set of methods used by cybercriminals to deceive individuals into handing over information
A way to create social media accounts
A process of encrypting data
16
17
Multiple Choice
Which of the following best describes social engineering compared to other cybercrimes?
It involves humans tricking other humans.
It uses advanced software to steal data.
It relies on physical theft of devices.
It is always performed online.
18
19
Open Ended
What is shoulder surfing and how does it work?
20
21
Multiple Select
Which of the following are characteristics of a phishing attack?
Victim receives a disguised email.
Attacker watches victim over their shoulder.
Victim is tricked into giving up valuable data.
Victim is asked to invent a scenario.
22
23
Fill in the Blanks
Type answer...
24
25
Open Ended
How does blagging (pretexting) differ from other forms of social engineering attacks?
26
27
Open Ended
If you hacked into a friend's account, does that make you a hacker? Was hacking into George's account ethical?
28
29
Multiple Choice
Which of the following is a reason someone might hack a computer system?
To steal data
To improve computer graphics
To learn a new language
To bake a cake
30
Open Ended
Why might people want to hack?
31
32
Open Ended
Is it ethical to hack into a company's systems to find data that will expose unethical practices? Explain your reasoning.
33
34
Fill in the Blanks
Type answer...
35
36
Multiple Select
Which of the following are motives for hacktivists?
Political reasons
Financial gain
To cause public embarrassment
To promote a cause
37
38
39
Fill in the Blanks
Type answer...
40
41
Open Ended
Explain why it is more difficult to stop a DDoS attack compared to a DoS attack.
42
Multiple Choice
Which of the following best describes a Distributed Denial of Service (DDoS) attack?
An attack using a single computer to overwhelm a system
An attack using multiple computers to make simultaneous requests
An attack that steals data from a system
An attack that encrypts files and demands ransom
43
44
Multiple Choice
Which of the following is an example of a brute force attack?
Sending phishing emails to users
Trying every possible password combination to access an account
Infecting computers with malware to create a botnet
Encrypting files and demanding payment for decryption
45
46
Fill in the Blanks
Type answer...
47
48
49
Multiple Choice
Which sections of the Computer Misuse Act (1990) address unauthorised access with intent to commit further offences and unauthorised acts with intent to impair?
Section 1 and Section 2
Section 2 and Section 3
Section 1 and Section 3
Section 1, Section 2, and Section 3
50
51
Open Ended
Describe how the WannaCry ransomware attack exploited vulnerabilities in Microsoft Windows and its global impact.
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Multiple Choice
Which of the following is a common measure to protect IT systems from cyberattacks?
Regular software updates
Ignoring suspicious emails
Sharing passwords
Disabling firewalls
66
Open Ended
What might some of these attacks be trying to steal or get access to?
Show answer
Auto Play
Slide 1 / 66
SLIDE
Similar Resources on Wayground
59 questions
Greek Mythology
Presentation
•
7th Grade
61 questions
ประวัติศาสตร์อเมริกาเหนือ
Presentation
•
8th Grade
58 questions
Mitosis vs Meiosis
Presentation
•
7th Grade
61 questions
Adams & Jefferson Presidential Administrations
Presentation
•
8th Grade
60 questions
Ecosystems & Cycles
Presentation
•
8th Grade
63 questions
Newton's 2nd Law of Motion
Presentation
•
8th Grade
58 questions
Petroski - Physical Science LEAP Review
Presentation
•
8th Grade
62 questions
GEOGRAPHY OF RUSSIA 1 PHYSICAL
Presentation
•
9th Grade
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade
Discover more resources for Computers
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
8 questions
Amoeba Sister Asexual vs Sexual Reproduction
Interactive video
•
8th Grade
15 questions
Pythagorean Theorem Word Problems Quizizz
Quiz
•
8th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
4 questions
Spring Break rest and recharge
Presentation
•
6th - 8th Grade
20 questions
Scatter Plots and Line of Best Fit
Quiz
•
8th Grade
19 questions
Introduction to Properties of Waves
Presentation
•
6th - 8th Grade
16 questions
Interactions within Ecosystems
Presentation
•
6th - 8th Grade