Search Header Logo
cyber again

cyber again

Assessment

Presentation

Computers

8th Grade

Practice Problem

Medium

Created by

J Pearson

Used 1+ times

FREE Resource

39 Slides • 27 Questions

1

media

2

media

3

Multiple Choice

Why is it important to protect data from cyberattacks?

1

Because data is valuable and can be exploited

2

Because it is required by law

3

Because it is expensive to store data

4

Because it is difficult to recover lost data

4

media

5

Multiple Choice

What is the difference between data and information?

1

Data is processed and meaningful, while information is raw facts and figures.

2

Data is raw facts and figures, while information is processed and meaningful.

3

Data and information are the same.

4

Information is always numerical, while data is always textual.

6

media

7

Open Ended

Why is customer data valuable to businesses?

8

media

9

Open Ended

How do social media companies make money if they are free to use?

10

Multiple Select

Which of the following types of data might social media companies collect?

1

Personal info such as name and date of birth

2

Content like images and status updates

3

User behaviour such as pages visited

4

All of the above

11

media

12

Fill in the Blanks

Type answer...

13

media

14

media

15

Multiple Choice

What is social engineering in the context of cybersecurity?

1

A technical method to protect data

2

A set of methods used by cybercriminals to deceive individuals into handing over information

3

A way to create social media accounts

4

A process of encrypting data

16

media

17

Multiple Choice

Which of the following best describes social engineering compared to other cybercrimes?

1

It involves humans tricking other humans.

2

It uses advanced software to steal data.

3

It relies on physical theft of devices.

4

It is always performed online.

18

media

19

Open Ended

What is shoulder surfing and how does it work?

20

media

21

Multiple Select

Which of the following are characteristics of a phishing attack?

1

Victim receives a disguised email.

2

Attacker watches victim over their shoulder.

3

Victim is tricked into giving up valuable data.

4

Victim is asked to invent a scenario.

22

media

23

Fill in the Blanks

Type answer...

24

media

25

Open Ended

How does blagging (pretexting) differ from other forms of social engineering attacks?

26

media

27

Open Ended

If you hacked into a friend's account, does that make you a hacker? Was hacking into George's account ethical?

28

media

29

Multiple Choice

Which of the following is a reason someone might hack a computer system?

1

To steal data

2

To improve computer graphics

3

To learn a new language

4

To bake a cake

30

Open Ended

Why might people want to hack?

31

media

32

Open Ended

Is it ethical to hack into a company's systems to find data that will expose unethical practices? Explain your reasoning.

33

media

34

Fill in the Blanks

Type answer...

35

media

36

Multiple Select

Which of the following are motives for hacktivists?

1

Political reasons

2

Financial gain

3

To cause public embarrassment

4

To promote a cause

37

media

38

media

39

Fill in the Blanks

Type answer...

40

media

41

Open Ended

Explain why it is more difficult to stop a DDoS attack compared to a DoS attack.

42

Multiple Choice

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

1

An attack using a single computer to overwhelm a system

2

An attack using multiple computers to make simultaneous requests

3

An attack that steals data from a system

4

An attack that encrypts files and demands ransom

43

media

44

Multiple Choice

Which of the following is an example of a brute force attack?

1

Sending phishing emails to users

2

Trying every possible password combination to access an account

3

Infecting computers with malware to create a botnet

4

Encrypting files and demanding payment for decryption

45

media

46

Fill in the Blanks

Type answer...

47

media

48

media

49

Multiple Choice

Which sections of the Computer Misuse Act (1990) address unauthorised access with intent to commit further offences and unauthorised acts with intent to impair?

1

Section 1 and Section 2

2

Section 2 and Section 3

3

Section 1 and Section 3

4

Section 1, Section 2, and Section 3

50

media

51

Open Ended

Describe how the WannaCry ransomware attack exploited vulnerabilities in Microsoft Windows and its global impact.

52

media

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

media

61

media

62

media

63

media

64

media

65

Multiple Choice

Which of the following is a common measure to protect IT systems from cyberattacks?

1

Regular software updates

2

Ignoring suspicious emails

3

Sharing passwords

4

Disabling firewalls

66

Open Ended

What might some of these attacks be trying to steal or get access to?

media

Show answer

Auto Play

Slide 1 / 66

SLIDE