2nd 9 Weeks Assessment - Cybersecurity

2nd 9 Weeks Assessment - Cybersecurity

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Alat Proses

Alat Proses

9th Grade

20 Qs

UNIT 1.2 MEMORY

UNIT 1.2 MEMORY

10th Grade

19 Qs

Pemograman Dasar 2

Pemograman Dasar 2

10th Grade

20 Qs

PTS Informatika Kelas 9 Semester Ganjil 2021-2022

PTS Informatika Kelas 9 Semester Ganjil 2021-2022

9th Grade

20 Qs

9.1 Homework #3

9.1 Homework #3

9th Grade

20 Qs

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

12th Grade

20 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Diagnóstico Apropiación Tecnológica

Diagnóstico Apropiación Tecnológica

1st Grade - Professional Development

15 Qs

2nd 9 Weeks Assessment - Cybersecurity

2nd 9 Weeks Assessment - Cybersecurity

Assessment

Quiz

Computers, Instructional Technology

9th - 12th Grade

Medium

Created by

Selena Simpson

Used 22+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What is cybersecurity?

The process of designing and building an executable computer program to accomplish a specific computing result or to perform a specific task.

The protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

A programming language we use in class

None of the Above

2.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

What is a component in cybersecurity? Select Only One.

Protection from Threats

Security in the computer that only cyber experts can do

None of the answers

No security with software on the computer

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What is Malware?

All information processed by computer systems, including programs and data.

A collection of instructions and data that tell the computer how to work

Any software intentionally designed to cause damage to a computer, server, client, or computer network

Computer hardware and software require each other and neither can be realistically used on its own.

4.

MULTIPLE CHOICE QUESTION

5 mins • Ungraded

Which Cybersecurity Career would you choose?

Cryptographer

System Analyst

Chief Information Security Officer

Cybersecurity Specialist

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Ransomware is

Something you buy at the store that is plastic and you can put it in the microwave.

A type of malware from crypto virology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

A typing person who types all day for another person.

A ransom for your shoes so that they can get them and put them on.

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Spyware is

A type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid

A type of threat to publish the victim's data or perpetually block access to it unless a ransom is paid and the ransom must come from that computer and no other computer.

a type of malware from that threatens to delete the victim's data or perpetually block access to it unless a ransom is paid

Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A Trojan is

Computer activities that are transmitting data covertly from their hard drive to the tape player in an off line environment for online use.

Any malware which misleads users of its true intent.

A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

A drive that enables a user to obtain information about another's computer activities by transmitting data from the USB drive

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?