Cyber Security 09/07/20

Cyber Security 09/07/20

6th - 8th Grade

20 Qs

quiz-placeholder

Similar activities

QUIZ: CYBER SECURITY

QUIZ: CYBER SECURITY

ICT Cyber Security Practice Test C

ICT Cyber Security Practice Test C

Cyber Lesson 4

Cyber Lesson 4

09/28/20- Cab 1-Cyber Security Review

09/28/20- Cab 1-Cyber Security Review

Cyber Security CIW Practice 1

Cyber Security CIW Practice 1

Cybersecurity - Lesson 1

Cybersecurity - Lesson 1

CIW Cyber Security Review

CIW Cyber Security Review

CyberSecurity - Mrs. Steffens Computer Coding Class

CyberSecurity - Mrs. Steffens Computer Coding Class

Cyber Security 09/07/20

Cyber Security 09/07/20

Assessment

Quiz

Computers

6th - 8th Grade

Medium

Created by

Michelle Aiken

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tami is trying to come up with a strong password for her new online banking account. What would be best for Tami to consider when creating the password?

She should use all lowercase letters and one number.

She should use all numbers

She should use at least one capital letter, one number, one symbol and it should be at least 8 characters long.

She should use her mothers name

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vicky teaches guitar lessons in her spare time. She has been building a digital footprint to promote her business. She likes to post short videos of her students performing, on her social media accounts. When she does, she never gives out the home location or full name of the student. This is an example of:

copyright violation

Computer Hacking

Marketing strategy

A privacy concern

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are downloading and installing an application from the Internet. Which is a best practice that you should follow to prevent installing malware accidently?

Scan the application while you are downloading the file.

Once the application has finished installing, scan the program prior to using.

Download the application instead of running it. It should be safe.

Scan the application file with your anti-virus program before downloading

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jan is using her gaming system that is connected to the Internet at home. She is playing a video game with other students at her school who are at their own houses. They are exchanging strategies as they play together in real-time. This is an example of:

online gaming

cybersecurity

social networking

video game exchange

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Angie has aced her cybersecurity class. Armed with this knowledge, what tips should Angie give her younger sister for protecting herself while she is gaming online?

She should recommend safety tips such as fighting back against bullying, attacking harassers, and sharing her name.

She should recommend safety tips such as not responding to bullying, blocking harassers, never agree to meet online friends in person and never give out personal information.

She does not need to recommend any tips because online gaming is very safe.

She can tell her younger sister that it is best not to use online gaming sites because nothing online is safe.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ms. Patterson gave a lesson on how following a set of rules for acceptable online communication is important. What has Ms. Patterson been teaching his class?

Poor Behaviors

Cyberbullying

Netiquette

Social Networking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is best practices for password use?

Always use your sisters name

Always use lower case and your address

Always use numbers only

Always use a mix of numbers, upper case letters, lower case letters and special characters

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers