Search Header Logo

Cybersecurity

Authored by Kevin Arnold

Computers

6th - 8th Grade

Used 31+ times

Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any kind of malicious activity that seeks or intends to steal, damage, or disrupt your devices' applications.

trolling

malware

cyber threats

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who misrepresents themselves online and hides their identity

hacker

ethical hacker

fake profile

cyberbully

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Repeated unwanted actions taken towards a person or group

trolling

phishing

hacking

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software designed to cause damage to data and system or gain access to a secure network.

virus

flu

malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A kind of malware that is designed to spread from one computer to another, these self-copy and most often steal information or data.

malware

virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An individual or group that gains unauthorized access to a computer application.

cyberbully

hacker

computer nerd

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Threats or harassment sent from one user to another online.

cyberbullying

hacking

phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?