Cyber Security Month 2019
Quiz
•
Education
•
KG - Professional Development
•
Hard
Used 19+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?
The site has special high definition
Information entered into the site is encrypted
The site is the newest version available
The site is not accessible to certain computers
None of the above
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following is an example of a “phishing” attack?
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
All of the above
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A group of computers that is networked together and used by hackers to steal information is called a …
Botnet
Rootkit
DDoS
Operating System
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …
Botnet
Ransomware
Driving
Spam
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
“Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?
Yes
No
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.
True
False
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
Use of insecure Wi-Fi networks
Key-logging
Malware
Phishing attacks
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
QUIZ 4 : TOPIC 8 [PROCESS COSTING]
Quiz
•
1st Grade - University
20 questions
Bilmecenin İzinde Maceranın Peşinde
Quiz
•
1st - 4th Grade
15 questions
Music of Islamic Mindanao
Quiz
•
7th Grade
16 questions
INVERTER
Quiz
•
University
20 questions
Curriculum Development
Quiz
•
University
15 questions
UK Education System
Quiz
•
University
16 questions
Nałkowska, Granica
Quiz
•
1st - 6th Grade
15 questions
Harmony Day
Quiz
•
1st - 5th Grade
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Education
12 questions
Digital Citizenship BSMS
Quiz
•
6th - 8th Grade
25 questions
Career Clusters
Quiz
•
6th - 8th Grade
14 questions
Spookley the Square Pumpkin
Quiz
•
2nd Grade
15 questions
Week 13 ELA Spiral Review
Quiz
•
3rd Grade
15 questions
Complex sentences
Quiz
•
5th Grade
67 questions
Dia de los muertos
Quiz
•
7th - 8th Grade
57 questions
Study Guide: Ser y Estar, El presente, y verbos reflexivos
Quiz
•
9th Grade
10 questions
Welcome Back Wolves/Wolves Don't Belong in Yellowstone
Quiz
•
3rd Grade
