
Cyber Security
Authored by Jade Brown
Computers
6th - 8th Grade
Used 1K+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Antivirus Software
Referring to the copying of data on a computer
Made to destroy computer viruses
How much data can be transferred in an amount of time
None of the above
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Backups/backing up files
Referring to the copying of data on a computer
The updating of files
A computer hacker whose activity is aimed to a social cause
None of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False
The I.S.P :Provides an indirect internet connection from the company's net work.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacktivists are people that go to protests and post about it online.
False
True
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This is an example of bandwidth:
The letter C key.
10 Mbps
The mouse
10 inches
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is an example of phishing?
Congratulations you just won a free car! Please enter your credit card number and email below to qualify.
You have just won a free trip to Disneyworld! Here are the details below:
Click this link and you will win a million dollars.
Click this link to prevent viruses.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware is when you have to pay a certain amount of money to gain access to the computer.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?