Cybersecurity threats 1

Cybersecurity threats 1

9th Grade

10 Qs

quiz-placeholder

Similar activities

L3 - Script Kiddies

L3 - Script Kiddies

9th - 12th Grade

7 Qs

social engineering

social engineering

1st Grade - Professional Development

10 Qs

threats to computer systems and networks

threats to computer systems and networks

9th Grade

15 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Cybersecurity L3: types of attacks

Cybersecurity L3: types of attacks

9th Grade

10 Qs

Social Engineering Starter

Social Engineering Starter

8th - 9th Grade

7 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Cybersecurity threats 1

Cybersecurity threats 1

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Phương Nguyễn

Used 24+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web.

cybersecurity

cybercriminals

privacy policies

Social engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes

cybersecurity

cybercriminals

privacy policies

Social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

individuals who use computers, networks, and the internet to perpetrate crime

cybersecurity

cybercriminals

privacy policies

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Statements about how a company will use and protect a consumer's private data.

cybersecurity

cybercriminals

privacy policies

Social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

attacks in which the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

phishing

blagging

shouldering

name generator attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail

phishing

blagging

shouldering

name generator attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Observing a person's private information over their shoulder e.g. cashpoint pin number

phishing

blagging

shouldering

name generator attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?