Basic cyber security knowledge

Basic cyber security knowledge

KG - University

9 Qs

quiz-placeholder

Similar activities

Evaluación primer Bloque

Evaluación primer Bloque

1st Grade

10 Qs

UX Design

UX Design

University

10 Qs

Spreadsheets

Spreadsheets

6th - 8th Grade

13 Qs

Quizz Internet

Quizz Internet

KG - Professional Development

12 Qs

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

1st - 10th Grade

10 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

Technology in Teaching and Learning

Technology in Teaching and Learning

1st Grade

10 Qs

Adobe Photoshop

Adobe Photoshop

University

10 Qs

Basic cyber security knowledge

Basic cyber security knowledge

Assessment

Quiz

Computers

KG - University

Practice Problem

Hard

Created by

Andrei Chirilov

Used 40+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Cyber security?

All the tools we use and actions we take to keep computers safe.

Protecting your computer against hackers

Being secure against cyber bots

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Hackers trying to hack your computer.

Term for any software that is designed to harm or do illegal activities.

Term for cookies trying to invade your computer and implement viruses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a worm?

A worm you see outside in the dirt.

A software used to worm into your computer.

Malware that can infect and spread without human assistance.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan Horse?

A big wooden horse used to attack Troy in ancient Greece.

A program with hidden malicious functions.

A program that tricks your computer and destroys it with the power of Social engineering.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware?

Malware that collects information about you without your consent or knowledge.

A program that looks through you laptop camera and allows your FBI Agent to see you.

A program that allows you to become a better spy and gives you tools to spy on your friends.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are loT devices?

Anything that is connected to the internet.

Smartphones, smart lightning, and connected speakers.

Devices that need a special key to unlock them.

Devices that require security procedures in order to keep them as uncompromised as possible, ex: Government computers.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zombie bot?

Compromised computers under the control of a hacker.

A bot that pretends it is dead but once it reaches your computer it takes over.

This does not exist.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is netiquette?

A term used to describe network attacks.

A malware that pretends to have ethical standards but attacks you when you least suspect it.

The term for commonly accepted rules of how to behave online.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall?

A wall made of fire in your computer to make sure your computer is heated up and running properly.

A software used to attack other security measures in your computer to insure your computer is safe.

A filter that filters incoming data, protecting a network from attacks.