Cyber Security Nova labs

Cyber Security Nova labs

6th - 8th Grade

23 Qs

quiz-placeholder

Similar activities

pautan teks dan imej dalam html

pautan teks dan imej dalam html

6th - 10th Grade

18 Qs

New Scratch

New Scratch

6th - 8th Grade

20 Qs

El Computador

El Computador

5th - 11th Grade

20 Qs

Componentes de una computadora

Componentes de una computadora

6th - 8th Grade

20 Qs

ICT and SST Week Quiz_Grade 6

ICT and SST Week Quiz_Grade 6

6th Grade

20 Qs

Yr7- Understanding computers Lessons 1-3

Yr7- Understanding computers Lessons 1-3

7th - 11th Grade

20 Qs

DOPAMINA Y REDES SOCIALES

DOPAMINA Y REDES SOCIALES

7th Grade

18 Qs

Hardware and Components

Hardware and Components

5th - 11th Grade

19 Qs

Cyber Security Nova labs

Cyber Security Nova labs

Assessment

Quiz

Computers

6th - 8th Grade

Practice Problem

Medium

Created by

DAVID GUTIERREZ

Used 21+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a network in this video?

interconnected computers or devices

A super computer

A computer vulnerability

An Internet service provider

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are cyber vulnerabilities unlikely to ever go away?

The government won’t allow people to fix them.

Criminals need them to steal identities.

They are side effects of the freedom and ease of communicating online.

They’re protected in a secret base on the moon.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What did the identity-theft crime ring use Tim’s photo for?

To create a Tim-like disguise

To make a counterfeit passport

They sent it in spam emails to Tim’s friends

To figure out Tim’s address

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Why do hackers hack?

To make discoveries

To protect information

To steal information and money

To expose corruption

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a hack?

 

Using a bicycle to power a computer

Stealing an unlocked bicycle

Building a working bicycle out of discarded umbrellas

Creating a kinetic bicycle sculpture

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is regularly used for secure online communication?

Caesar cipher

Public-key cryptography

Morse code

Enigma code

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you tell if a website encrypts its traffic?

Google it.

Look for the lock symbol in a URL.

All websites encrypt their traffic.

Encrypted sites take longer to load.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers