Cyber Security Month 2019

Cyber Security Month 2019

KG - Professional Development

20 Qs

quiz-placeholder

Similar activities

palabras con s,t,r

palabras con s,t,r

1st Grade

15 Qs

4 EsP 1st Trim Reviewer 2020

4 EsP 1st Trim Reviewer 2020

4th Grade

20 Qs

QUIZ 4 : TOPIC 10 [STANDARD COSTING & VARIANCE ANALYSIS]

QUIZ 4 : TOPIC 10 [STANDARD COSTING & VARIANCE ANALYSIS]

1st Grade - University

20 Qs

Class Rules

Class Rules

2nd - 4th Grade

16 Qs

CJMS Student Handbook 22-23

CJMS Student Handbook 22-23

6th - 8th Grade

20 Qs

Quiz 1st round

Quiz 1st round

1st - 5th Grade

20 Qs

UTAR Industrial Session

UTAR Industrial Session

University - Professional Development

15 Qs

Labor Relations and Negotations 1

Labor Relations and Negotations 1

University - Professional Development

15 Qs

Cyber Security Month 2019

Cyber Security Month 2019

Assessment

Quiz

Education

KG - Professional Development

Practice Problem

Hard

Used 19+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?

The site has special high definition

Information entered into the site is encrypted

The site is the newest version available

The site is not accessible to certain computers

None of the above

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is an example of a “phishing” attack?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows

Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest

All of the above

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A group of computers that is networked together and used by hackers to steal information is called a …

Botnet

Rootkit

DDoS

Operating System

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …

Botnet

Ransomware

Driving

Spam

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

“Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?

Yes

No

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.

True

False

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

Use of insecure Wi-Fi networks

Key-logging

Malware

Phishing attacks

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?