CyberSecurity Lesson 4

CyberSecurity Lesson 4

6th - 8th Grade

13 Qs

quiz-placeholder

Similar activities

VÍRUS DE COMPUTADORES

VÍRUS DE COMPUTADORES

1st Grade - Professional Development

10 Qs

Online Scams and Schemes

Online Scams and Schemes

7th Grade

11 Qs

DF module 1

DF module 1

4th - 8th Grade

8 Qs

E-Safety

E-Safety

KG - 12th Grade

10 Qs

Network Topologies & Malware

Network Topologies & Malware

6th - 12th Grade

17 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

Computer Litercy Chapter 5

Computer Litercy Chapter 5

6th Grade

14 Qs

Intro to Cybersecurity  2.0

Intro to Cybersecurity 2.0

5th - 8th Grade

13 Qs

CyberSecurity Lesson 4

CyberSecurity Lesson 4

Assessment

Quiz

Computers

6th - 8th Grade

Medium

CCSS
RI.6.7, L.6.6, RI.7.7

+7

Standards-aligned

Used 884+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be considered a strong password?
Kim12345
mydogSpot
JLP17#butterflies
joesmithpelicanmiddleschool

Tags

CCSS.RI.6.7

CCSS.RI.7.7

CCSS.RI.8.7

CCSS.RL.6.7

CCSS.RL.7.7

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When visiting a website, you notice a lock icon in the lower-right corner of the browser window.  What does the lock represent?
A link to open another site
A webpage that has a secure connection
A program that prevents you from leaving the page
A warning that you are not allowed to view this webpage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a scam?
A friend sends you an e-mail asking to borrow some money.
Your brother sends you a text message on your mobile device.
A pop-up appears in your online game urging you to click the image.
Your teacher sends you an e-mail message with the homework assignment.

Tags

CCSS.L.6.6

CCSS.L.8.6

CCSS.W.6.2D

CCSS.W.7.2D

CCSS.W.8.2D

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes a self-replicating program that damages the normal operation of a computer?
worm
phishing
virus
plagiarism

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Viruses, worms, and trojans are common security threats that are often used in spreading:
scams.
malware.
downloads.
passwords.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are creating a new online account.  What piece of information that you supply should be strong and hard to break?
a password
a username
an e-mail address
a picture of yourself

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While Trish was playing an online game, a pop-up appeared, prompting her to click on the flashing lights to receive more points for her game.  What should she do?
Click on the flashing lights.
Turn off the game and the gaming console.
Click the X in the corner of the pop-up to make it go away.
Save the pop-up message until she really needs extra points to win.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?