Online Safety: CyberSecurity
Quiz
•
Computers
•
6th - 12th Grade
•
Medium
Joanne DiSimone
Used 156+ times
FREE Resource
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What is antivirus software?
Computer programs that can block, detect, and remove viruses and other malware. Only effective if one stays current with the software updates.
Extra copies of computer files that can be used to restore files that are lost or damaged.
The amount of data that can pass through a network or part of a network per second.
Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What are backups?
Computer programs that can block, detect, and remove viruses and other malware.
Extra copies of computer files that can be used to restore files that are lost, damaged, or corrupted from a virus.
The amount of data that can pass through a network or part of a network per second.
Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What is bandwidth?
Computer programs that can block, detect, and remove viruses and other malware.
Extra copies of computer files that can be used to restore files that are lost or damaged.
It is the capacity of a network to upload and download data; it determines your ability to stream or not.
Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What is a botnet?
Computer programs that can block, detect, and remove viruses and other malware.
Extra copies of computer files that can be used to restore files that are lost or damaged.
The amount of data that can pass through a network or part of a network per second.
Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What is Social Engineering?
Two or more interconnected devices that can exchange data.
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes
A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
The use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What is Tokenization?
Two or more interconnected devices that can exchange data.
It is a process by which a piece of sensitive data, such as a credit card number, is replaced by a surrogate value known as a token (such as using emojis for letters of the alphabet).
A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
An example of symmetric encryption—a method that uses the same mathematical key to code and decode a message. For example: each letter in the alphabet being shifted or “rotated”
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What is a DDoS?
Two or more interconnected devices that can exchange data.
A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical infrastructure.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
Начала программирования на языке Паскаль
Quiz
•
8th - 11th Grade
13 questions
RAM&HDD/SSD
Quiz
•
10th - 12th Grade
15 questions
Quiz informatyczny
Quiz
•
1st - 8th Grade
15 questions
[RB3-Ch9] Application of Computers
Quiz
•
8th Grade
15 questions
11° Evaluación bimestral de informática
Quiz
•
11th Grade
19 questions
Informatika Kelas 5 Bab 2
Quiz
•
5th Grade - University
15 questions
7ICT - Algorithms Revision Quiz
Quiz
•
7th Grade
Popular Resources on Wayground
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
4 questions
Activity set 10/24
Lesson
•
6th - 8th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
How to Email your Teacher
Quiz
•
Professional Development
15 questions
Order of Operations
Quiz
•
5th Grade
30 questions
October: Math Fluency: Multiply and Divide
Quiz
•
7th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
14 questions
Email your Teacher
Quiz
•
6th - 8th Grade
20 questions
Six Weeks Test 2 Review
Lesson
•
9th - 12th Grade
12 questions
Overview of Mexico Part 1
Lesson
•
9th - 12th Grade
40 questions
Programming with Karel
Quiz
•
6th - 8th Grade
16 questions
Lesson 3.5 - If Structures Practice
Quiz
•
11th Grade
20 questions
Binary Numbers Quiz
Quiz
•
6th - 8th Grade
10 questions
Exploring Computer Hardware and Software Components
Interactive video
•
6th - 10th Grade
