cyber security intro

cyber security intro

9th - 12th Grade

18 Qs

quiz-placeholder

Similar activities

Threats to computer systems and networks

Threats to computer systems and networks

9th - 11th Grade

14 Qs

Security Systems - Threats

Security Systems - Threats

10th Grade

14 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Cyber security

Cyber security

10th - 11th Grade

19 Qs

CYBER SAFETY

CYBER SAFETY

9th Grade

20 Qs

Malware

Malware

7th - 11th Grade

15 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

cyber security intro

cyber security intro

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Nicola Woods

Used 20+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine

reply, pointing out the error

report it as a possible phishing scam

forward the email to a friend to check

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the most probable reason for a young person to launch a cyber attack?

Fun

Financial Gain

Denial of Service

Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The image shows what cause of a cyber attack

Fun

Personal attack

Disruption

Data theft

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?