Year 9 Unit 1 Cybersecurity

Year 9 Unit 1 Cybersecurity

9th Grade

11 Qs

quiz-placeholder

Similar activities

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

social engineering

social engineering

1st Grade - Professional Development

10 Qs

Phishing and spam

Phishing and spam

9th - 12th Grade

10 Qs

Social Engineering Starter

Social Engineering Starter

8th - 9th Grade

7 Qs

Y9 Social Engineering

Y9 Social Engineering

9th Grade

10 Qs

Social engineering

Social engineering

9th - 10th Grade

15 Qs

Year 9 Unit 1 Cybersecurity

Year 9 Unit 1 Cybersecurity

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Erick Geronimo

Used 4+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Raw facts and figures

Data

Information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information is created when data has been processed and becomes meaningful.

True

False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

As a data subject, you have the right to find out what information the government and other organisations store about you.

True

False

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.

Social engineering

Data protection

Cyberwar

Social manipulation

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attack designed to steal a victim's password or other sensitive data.

Shouldering

Phishing

Blagging

Name generator attack

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

These are attacks in which the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

Shouldering

Name generator attacks

Phishing

Blagging

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attack in which the victim receives an email disguised to look as if it has come from a reputable source in order to trick them into giving up valuable data.

Phishing

Blagging

Shouldering

Name generator attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?