Intro to Cybersecurity Ch 1 Part 1

Intro to Cybersecurity Ch 1 Part 1

7th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

Giant Panda

Giant Panda

3rd - 9th Grade

10 Qs

Latihan 1 teks deskripsi

Latihan 1 teks deskripsi

7th Grade

10 Qs

Cyber Crimes Mini Quiz

Cyber Crimes Mini Quiz

8th Grade

6 Qs

Computer Threats And Securities - Revision Class 8

Computer Threats And Securities - Revision Class 8

8th Grade

9 Qs

Grade 11 CSC

Grade 11 CSC

11th Grade

10 Qs

Apply safety and Health Procedure (OSH)

Apply safety and Health Procedure (OSH)

7th Grade

10 Qs

Digiventurer Teens Winter Sports

Digiventurer Teens Winter Sports

7th - 11th Grade

8 Qs

Health and safety Logistics

Health and safety Logistics

10th - 11th Grade

9 Qs

Intro to Cybersecurity Ch 1 Part 1

Intro to Cybersecurity Ch 1 Part 1

Assessment

Quiz

Other

7th - 12th Grade

Easy

Created by

Chris Lorenz

Used 23+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

What year was the first hack created?

2020

1980

1960

2000

2.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Hacking tools basically are used for? Select (3)

for the fun of it

infiltrate systems

Spy on users

Plant malware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is cybersecurity?

Protecting against hackers

Protecting against you

Protecting against me

none of above

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Phreaking is hacking a phone?

True

False

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a computer virus

A cold

Malicious software

Just a myth

A worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dumpster diving is?

Gross

Never done

A form is high diving

Digging through trash for information

7.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of the following groups are considered Hacktivist?

Mickey's Crew

Anonymous

Hackers R Us

None of the above

8.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the basic way a worm virus spreads?

E-mail

Sharing files

Via handshake

It can only infect the host computer

9.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Bug-bounty programs reward users for finding vulnerabilities?

True

False