Cyber Security Interim Homework

Cyber Security Interim Homework

8th Grade

15 Qs

quiz-placeholder

Similar activities

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

Lekcja14 7-8

Lekcja14 7-8

7th - 8th Grade

13 Qs

EVOLUTION OF COMPUTERS

EVOLUTION OF COMPUTERS

4th - 8th Grade

16 Qs

Programming Lesson 3

Programming Lesson 3

6th - 8th Grade

12 Qs

Sprawdź się

Sprawdź się

4th - 12th Grade

10 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

New Scratch

New Scratch

6th - 8th Grade

20 Qs

Cyber Security Interim Homework

Cyber Security Interim Homework

Assessment

Quiz

Computers

8th Grade

Practice Problem

Hard

Created by

Tracy Mayhead

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which UK law gives you the right to access the data an organisation stores on you?

The Freedom of Information Act

The Computer Misuse Act

The Data Protection Act

The Copyright, Designs, and Patents Act

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Why might a company collect information about you to form a profile? (Which two of the following apply)

So that they can recommend products to you based on previous products you have purchased or viewed.

So that they can sell the information to marketing companies

So that they can sell the information onto cybercriminals without your permission.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is the following data or information:

"Sophie got 38 out of 40 on her English test"

Data

Information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When data has been processed and is meaningful, which of these has it become?

Information

Processed data

Identifiable data

Profiled

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Data Protection Act?

To protect an organisation from hackers

To require organisations that store data on people to use it responsibly and keep it safe.

To act as a deterrent to cybercriminals who try to steal data on people

To prevent cybercriminals from spreading a virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

Methods used by cybercriminals to deceive individuals into handing over information

Hacking a system by taking control of someone else's computer

Using the computer of someone who has accidently left themselves logged on

A malicious attempt to disrupt a server or network by flooding it with internet traffic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

Shouldering

Phishing

Spam

Blagging

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?