cybersecurity hackers

cybersecurity hackers

11th Grade

15 Qs

quiz-placeholder

Similar activities

Cybersecurity Fund:  Unit 1 Review

Cybersecurity Fund: Unit 1 Review

9th - 12th Grade

15 Qs

3C Mini Assessment

3C Mini Assessment

10th - 11th Grade

20 Qs

CIA Triad Summer School Exam 2

CIA Triad Summer School Exam 2

9th - 12th Grade

20 Qs

BTEC Digital Information Technology: Component 2 - Learning Aim A

BTEC Digital Information Technology: Component 2 - Learning Aim A

9th - 11th Grade

15 Qs

BTEC DIT C3 LAB - Device Hardening & Encryption

BTEC DIT C3 LAB - Device Hardening & Encryption

10th - 11th Grade

10 Qs

Understanding ICT

Understanding ICT

9th Grade - University

16 Qs

Hashing, Digital Signatures and BlockChain Practice Questions

Hashing, Digital Signatures and BlockChain Practice Questions

11th Grade

10 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

cybersecurity hackers

cybersecurity hackers

Assessment

Quiz

Computers

11th Grade

Medium

Created by

JOYCE PACHECO

Used 63+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Constant news stories about potential cyber attacks by terrorist groups coupled with the knowledge of how much information the NSA was collecting has lead people to rethink the balance between these two topics. (Pick Two)

Safety

Privacy

Health

Freedom

2.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Which of the following is an example of an Internet Data Domain? (Pick Two)

Facebook

Cisco

Google

CompTIA

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of these is true? (select all that apply)

Cybersecurity is important to learn because it encompasses everything that pertains to protecting our sensitive data

One of the best ways to protect your information is to use two factor authentication as much as possible, and keep complicated passwords

Use a VPN if you are going to be on public Wi-Fi

Cybersecurity is so important now because the cybersecurity risks are greater and so is the number of devices.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does a ransomware hacker do when they gain access to a user’s system?

Encrypt important files

Delete key system data

Copy a users personal data

Move operating system data

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email?

Knowing your full name

Knowing your hobbies

Knowing a recent store that you shopped at

Knowing your address

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a storage device connected to a network?

NAS

Cloud

RAID

SAN

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym IoE represent?

Internet of Everything

Intelligence on Everything

Internet of Everyday

Insight into Everything

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?