2019 - 20 CyberSecurity Final

2019 - 20 CyberSecurity Final

9th - 12th Grade

100 Qs

quiz-placeholder

Similar activities

Electronics I PreTest

Electronics I PreTest

9th - 12th Grade

98 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

100 Qs

Brainpop Malware

Brainpop Malware

11th Grade

100 Qs

Computer Science Revison

Computer Science Revison

11th Grade

100 Qs

Computer Science Everything

Computer Science Everything

10th - 11th Grade

97 Qs

Javascript

Javascript

7th Grade - Professional Development

105 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

100 Qs

Digital IT Exam Prep

Digital IT Exam Prep

KG - University

99 Qs

2019 - 20 CyberSecurity Final

2019 - 20 CyberSecurity Final

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Debbie Madison

Used 23+ times

FREE Resource

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of these groups exploits cyber vulnerabilities?

Criminals

Governments

Hacktivists

All of the above.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Why do hackers hack?

To make discoveries

To protect information

To steal information and money

To expose corruption

All of the above

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Select all correct answers: Which of the following statements are true?

There has been a decrease in the number of cyber attacks in the past decade.

Cybersecurity is the protection of computer systems, networks, and data from digital attacks.

Cyber attacks in the past few years have impacted individuals, governments, and organizations.

None of the above

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In 2016, online fraud cases in the United States resulted in victim losses totaling:

Nothing–online fraud doesn’t result in victim losses

$100,000

$2 million

Over $1.2 billion

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which term describes bad people who watch and read your personal information online for the purpose of harassing or harming you?

Online teachers

Digital footprints

Online predators

Social networkers

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. Hackers come in different levels or degrees. A black hat hacker ...

Individuals with extraordinary computing skills who hack into a network for malicious and/or destructive activities. Also may be known as crackers.

Individuals with extraordinary computing skills who hack into a network in order to evaluate its security, rather than with malicious or criminal intent.

Individuals with extraordinary computing skills who hack into a network who may sometimes violate laws or typical ethical standards, but does not have a malicious intent.

a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. Hackers come in different levels or degrees. A white hat hacker ...

Individuals with extraordinary computing skills who hack into a network for malicious and/or destructive activities. Also may be known as crackers.

Individuals with extraordinary computing skills who hack into a network in order to evaluate its security, rather than with malicious or criminal intent.

Individuals with extraordinary computing skills who hack into a network who may sometimes violate laws or typical ethical standards, but does not have a malicious intent.

a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?