
Cybersecurity
Authored by Joan Lim
Education
9th - 12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
32 questions
Show all answers
1.
MATCH QUESTION
30 sec • 10 pts
Try to match each type of malware with the correct scenario
Man-in-the-middle
A user's computer boots, but when they try to access their data, it appears garbled and is unreadable.
Rootkit
While checking a monitor cable, a user notices a strange-looking USB device plugged into the back of their compture
Ransomware
A software program was not reviewd by a peer nor checked by a quality assurance team before it's release to the public
Programming Error
A vistor to a website notices a delay in exchanging data with the site and the lock symbol in the address bar looks strange
Botnet/DDos
Access to system devices, such as printers and network switches, fails frequently. To solve the problem, the comuters operating system must be rebuilt.
2.
DRAW QUESTION
30 sec • 10 pts
Diagram what happens in an On-Path Attack

3.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
An ethical cyber expert can expect the following aspects to their career except for
Many rewarding career opportunities
May never get hired anywhere
Lifetime earning
Can provide reliable, stable lifestyle
4.
MATCH QUESTION
30 sec • 10 pts
Match the following name of the motivation of a hacker with the correct description
Financial Gain
Companies steal information from competitors to elimate the competition.
Prevention
An "insider" exposes injustice that the organization is committing.
Social Ideology
Criminals steal money from individuals & corporations
Whistleblower
With permission from the system owner, authorized hackers find the weaknesses of a system and report their findings.
Industrial Espionage
Hackers engage in "hactivism" to change aspects of society
5.
OPEN ENDED QUESTION
30 sec • 5 pts
What is the difference between Hardware Keyloggers and Software keyloggers
Evaluate responses using AI:
OFF
6.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
What is latency?
a delay in the transfer of data
an encryption code
a type of crypto-currency
a type of malware
7.
REORDER QUESTION
30 sec • 10 pts
Reorder the following steps for using FileZilla
On remote site, find file(s) to copy
Select files to copy under Local Site
Right-click file & choose "Upload"
Enter IP address of remote machine in Host Field
Enter username & Password
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
27 questions
MHS Cheer - Signs/Knowledge Practice
Quiz
•
9th - 12th Grade
27 questions
Economics
Quiz
•
10th Grade - University
27 questions
FOE Chp. 3
Quiz
•
11th Grade
27 questions
Polskie ślady na Ukrainie Zachodniej. Wybitni Polacy
Quiz
•
9th Grade - University
28 questions
Chapter 10: Circles
Quiz
•
8th - 10th Grade
27 questions
Intro to Credit
Quiz
•
10th - 12th Grade
27 questions
Practical Research 1_Lec 2
Quiz
•
11th Grade
28 questions
BÀI 15 KTPL 11 TN
Quiz
•
11th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade