Y7 - Cybersecurity

Y7 - Cybersecurity

6th Grade

19 Qs

quiz-placeholder

Similar activities

History of Computers - Part 5: 1973-Present

History of Computers - Part 5: 1973-Present

6th Grade

15 Qs

The Internet and the Web

The Internet and the Web

5th - 6th Grade

20 Qs

Yr 8.1 Spreadsheet/Excel Models

Yr 8.1 Spreadsheet/Excel Models

6th - 8th Grade

20 Qs

Publisher 2019 - 5° Primaria

Publisher 2019 - 5° Primaria

5th - 7th Grade

20 Qs

Bezpieczne i odpowiedzialne korzystanie z Internetu

Bezpieczne i odpowiedzialne korzystanie z Internetu

4th - 8th Grade

20 Qs

Guess That Games

Guess That Games

4th Grade - University

16 Qs

[RB3-Ch7] Data Verification & Validation

[RB3-Ch7] Data Verification & Validation

6th - 8th Grade

15 Qs

MS excel Keyword quiz

MS excel Keyword quiz

6th Grade

17 Qs

Y7 - Cybersecurity

Y7 - Cybersecurity

Assessment

Quiz

Computers

6th Grade

Hard

Created by

K McCall

Used 522+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Why do people carry out cyber attacks?

Financial Gain

Fun/Challenge

To disrupt the business

Personal grudge

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is illegal

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does unauthorised mean?

Not allowed

Allowed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is hacking?

Accessing a computer system without permission

Accessing a computer system with permission

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access a computer without permission (hacking) is in breach of the...

Communications Act

Data Protection Act

Computer Misuse Act

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the weakest points of computer systems are...

Software that has not been updated

Badly configured systems

Users who choose weak passwords

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is Two Factor Authentication?

A security feature that sends a text to your phone when you try to login to a website with a code to use

Asks you further security questions when you login from an unusual location

A way of checking that the person logging in is the real person

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?