Cyber Security Nova labs

Cyber Security Nova labs

6th - 8th Grade

23 Qs

quiz-placeholder

Similar activities

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

HELE 4 Chapter 2: Lessons 1 and 2

HELE 4 Chapter 2: Lessons 1 and 2

6th Grade

20 Qs

Y9 Cyber Security Homework

Y9 Cyber Security Homework

8th Grade

20 Qs

Malicious software

Malicious software

7th Grade

20 Qs

Y9 - Computer Science

Y9 - Computer Science

8th Grade

20 Qs

Viruses and Malware

Viruses and Malware

7th - 9th Grade

20 Qs

Computing Systems Vocabulary Quiz

Computing Systems Vocabulary Quiz

6th - 7th Grade

20 Qs

Malware

Malware

7th - 10th Grade

22 Qs

Cyber Security Nova labs

Cyber Security Nova labs

Assessment

Quiz

Computers

6th - 8th Grade

Medium

Created by

DAVID GUTIERREZ

Used 21+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a network in this video?

interconnected computers or devices

A super computer

A computer vulnerability

An Internet service provider

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are cyber vulnerabilities unlikely to ever go away?

The government won’t allow people to fix them.

Criminals need them to steal identities.

They are side effects of the freedom and ease of communicating online.

They’re protected in a secret base on the moon.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What did the identity-theft crime ring use Tim’s photo for?

To create a Tim-like disguise

To make a counterfeit passport

They sent it in spam emails to Tim’s friends

To figure out Tim’s address

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Why do hackers hack?

To make discoveries

To protect information

To steal information and money

To expose corruption

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a hack?

 

Using a bicycle to power a computer

Stealing an unlocked bicycle

Building a working bicycle out of discarded umbrellas

Creating a kinetic bicycle sculpture

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is regularly used for secure online communication?

Caesar cipher

Public-key cryptography

Morse code

Enigma code

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you tell if a website encrypts its traffic?

Google it.

Look for the lock symbol in a URL.

All websites encrypt their traffic.

Encrypted sites take longer to load.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?