Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

quiz-placeholder

Similar activities

แบบทดสอบบทที่ 3 เรื่อง แก้ปัญหาด้วย  Scratch

แบบทดสอบบทที่ 3 เรื่อง แก้ปัญหาด้วย Scratch

7th Grade

20 Qs

Mengenal Jendela dan Ikon Microsoft Excel

Mengenal Jendela dan Ikon Microsoft Excel

7th Grade - University

15 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

EXAMEN-2°AÑO-INFORMATICA P3-2021

EXAMEN-2°AÑO-INFORMATICA P3-2021

1st - 9th Grade

13 Qs

PTS PWPB Kelas 11 Sem 1

PTS PWPB Kelas 11 Sem 1

11th Grade

21 Qs

SUMATIF MS WORD X E 4 DAN 5

SUMATIF MS WORD X E 4 DAN 5

10th Grade

20 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Python. Функції

Python. Функції

9th Grade

17 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

Assessment

Quiz

Computers

6th - 12th Grade

Medium

Created by

Joanne DiSimone

Used 156+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

What is antivirus software?

Computer programs that can block, detect, and remove viruses and other malware. Only effective if one stays current with the software updates.

Extra copies of computer files that can be used to restore files that are lost or damaged.

The amount of data that can pass through a network or part of a network per second.

Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

What are backups?

Computer programs that can block, detect, and remove viruses and other malware.

Extra copies of computer files that can be used to restore files that are lost, damaged, or corrupted from a virus.

The amount of data that can pass through a network or part of a network per second.

Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

What is bandwidth?

Computer programs that can block, detect, and remove viruses and other malware.

Extra copies of computer files that can be used to restore files that are lost or damaged.

It is the capacity of a network to upload and download data; it determines your ability to stream or not.

Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

What is a botnet?

Computer programs that can block, detect, and remove viruses and other malware.

Extra copies of computer files that can be used to restore files that are lost or damaged.

The amount of data that can pass through a network or part of a network per second.

Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

What is Social Engineering?

Two or more interconnected devices that can exchange data.

The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes

A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.

The use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

What is Tokenization?

Two or more interconnected devices that can exchange data.

It is a process by which a piece of sensitive data, such as a credit card number, is replaced by a surrogate value known as a token (such as using emojis for letters of the alphabet).

A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.

An example of symmetric encryption—a method that uses the same mathematical key to code and decode a message. For example: each letter in the alphabet being shifted or “rotated”

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

What is a DDoS?

Two or more interconnected devices that can exchange data.

A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.

A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.

A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical infrastructure.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?