Search Header Logo

Cyber Security CIW Practice 1

Authored by Denise Reichard

Computers

6th - 8th Grade

Used 8+ times

Cyber Security CIW Practice 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Andrew is upset at Jessica.


He negatively attacks her physical appearance, choice in friends and interests on social media.


Several other students also add to the negative commentary.


Jessica sees the comments. How will Jessica most likely respond to the cyberbullying?

Jessica may counter attack Andrew and feel motivated by the conflict

Jessica may ignore the comments and feel more confident in her emotional control.

Jessica may feel happy to have so much attention on social media.

Jessica may become depressed and isolate herself from everyone.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

You received an e-mail message from someone you don't know.


The e-mail requests you to click a link and provide some information.


It says that in exchange, you will receive access to a site that offers incredible deals on popular items, up to 90 percent off retail cost.


This offer sounds too good to be true. What type of security threat have you encountered?

Trojan

Virus

Phishing

Pharming

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Gwen has a hard time remembering her passwords.


Her best friend recommends that she try her technique.


She uses her first name followed by the digits for her address, such as gwen5336.


Is this good advice?

Yes, passwords should be easy to remember.

Yes, the password is strong because it has letters and numbers.

No, ideal password length should be 4 to 6 characters.

No, passwords should not contain personal identifying information such as names, birthdates or addresses.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

April gives her friend a Web site address.


She recommends that her friend check it out and possibly sign-up.


April explains that the Web site is for a group of friends to use to connect with each other.


Which of the following best describes the type of Web site April is recommending?

Social network

Wiki

Collaborative group

Online gaming

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following best describes a social network?

A place where books are stored, such as the library

A group of people using a Web site to connect

Sending junk e-mail to many people at once

Membership in a face-to-face book club

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Mario has purchased a new computer. He wants to be sure that it remains in good condition. He also does not want the computer to become infected with any malware. What would be the most common activity to cause Mario's computer to become infected with malware?

Downloading images

Using online chat rooms

Playing online games

Downloading software

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Igor has found a copyrighted video on the Internet that he wants to use as part of his school project. Under the Fair Use law, which of the following could he do with the video?

Use only 10% or 30 seconds of the video, whichever is less.

Whatever he wants, because copyright laws do not apply to education.

Pay a fee to the site from which he is downloading the video.

Use only 10% or 3 minutes of the video, whichever is less.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?