cybersecurity vocabulary

cybersecurity vocabulary

5th - 6th Grade

30 Qs

quiz-placeholder

Similar activities

9.3.5 - Retrieval Quiz

9.3.5 - Retrieval Quiz

6th Grade

34 Qs

REVIEW Unit 3 Web Browsers, Email, and Safe Computing

REVIEW Unit 3 Web Browsers, Email, and Safe Computing

6th Grade

31 Qs

COMPTIA ITF

COMPTIA ITF

1st Grade - Professional Development

29 Qs

internet terms gpaul

internet terms gpaul

6th Grade - University

32 Qs

Chapter 2 assessment Computer Science

Chapter 2 assessment Computer Science

6th - 9th Grade

25 Qs

Internet Safety Review

Internet Safety Review

6th Grade

35 Qs

Fun KS2 Computing Quiz

Fun KS2 Computing Quiz

2nd - 5th Grade

25 Qs

9.1 - Computer Crime and Cyber Security

9.1 - Computer Crime and Cyber Security

4th - 9th Grade

30 Qs

cybersecurity vocabulary

cybersecurity vocabulary

Assessment

Quiz

Computers

5th - 6th Grade

Medium

Created by

Justin Tijerina

Used 62+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

This cipher uses a key number that indicate how much the letters shift - also a salad!

computer virus

cryptography

caesar

hal

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Designed to protect computer users against deliberate attacks and theft of information.

computer miss-use act

computer virus

cyber crime

encryption

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A small but dangerous piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet.

firewall

computer virus

hacking

malware

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The art of Code writing or breaking

cybercrime

trojan

virus

cryptography

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Any illegal activities committed through the use of computers and the internet.

cybercrime

worm

virus

social engineering

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The stealing of secrets stored in digital formats or on computers and IT networks.

spim

spyware

trojan

cyber espionage

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use on normal equipment.

encryption

firewall

analysis

hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?