cybersecurity hackers

cybersecurity hackers

11th Grade

15 Qs

quiz-placeholder

Similar activities

Cyber Security Certification Test

Cyber Security Certification Test

11th - 12th Grade

20 Qs

Security Fundamentals Review 1

Security Fundamentals Review 1

11th Grade

10 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

WJEC Computer Science KO - Security and Data Management

WJEC Computer Science KO - Security and Data Management

11th Grade

10 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

Cybersecurity Ethics

Cybersecurity Ethics

10th Grade - University

10 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

15 Qs

Cybersecurity

Cybersecurity

11th - 12th Grade

20 Qs

cybersecurity hackers

cybersecurity hackers

Assessment

Quiz

Computers

11th Grade

Medium

Created by

JOYCE PACHECO

Used 58+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Constant news stories about potential cyber attacks by terrorist groups coupled with the knowledge of how much information the NSA was collecting has lead people to rethink the balance between these two topics. (Pick Two)

Safety

Privacy

Health

Freedom

2.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Which of the following is an example of an Internet Data Domain? (Pick Two)

Facebook

Cisco

Google

CompTIA

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of these is true? (select all that apply)

Cybersecurity is important to learn because it encompasses everything that pertains to protecting our sensitive data

One of the best ways to protect your information is to use two factor authentication as much as possible, and keep complicated passwords

Use a VPN if you are going to be on public Wi-Fi

Cybersecurity is so important now because the cybersecurity risks are greater and so is the number of devices.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does a ransomware hacker do when they gain access to a user’s system?

Encrypt important files

Delete key system data

Copy a users personal data

Move operating system data

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email?

Knowing your full name

Knowing your hobbies

Knowing a recent store that you shopped at

Knowing your address

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a storage device connected to a network?

NAS

Cloud

RAID

SAN

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym IoE represent?

Internet of Everything

Intelligence on Everything

Internet of Everyday

Insight into Everything

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?