Search Header Logo

Cyber Security

Authored by Jade Brown

Computers

6th - 8th Grade

Used 1K+ times

Cyber Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Antivirus Software

Referring to the copying of data on a computer
Made to destroy computer viruses
How much data can be transferred in an amount of time
None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Backups/backing up files

Referring to the copying of data on a computer
The updating of files
A computer hacker whose activity is aimed to a social cause
None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False
The I.S.P :Provides an indirect internet connection from the company's net work.

True
False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacktivists are people that go to protests and post about it online.

False
True

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is an example of bandwidth:

The letter C key.
10 Mbps
The mouse
10 inches

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of phishing?

Congratulations you just won a free car! Please enter your credit card number and email below to qualify.
You have just won a free trip to Disneyworld! Here are the details below:
Click this link and you will win a million dollars.
Click this link to prevent viruses.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is when you have to pay a certain amount of money to gain access to the computer.

True
False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?