Cybersecurity - L3 Recap

Cybersecurity - L3 Recap

8th Grade

10 Qs

quiz-placeholder

Similar activities

Malware Terms

Malware Terms

8th Grade

15 Qs

Computer Misuse

Computer Misuse

7th - 8th Grade

8 Qs

J277 Network Threats

J277 Network Threats

7th - 11th Grade

10 Qs

Computer Security

Computer Security

7th - 10th Grade

12 Qs

Computer Virus

Computer Virus

6th - 8th Grade

10 Qs

Cyber Security Interim Homework

Cyber Security Interim Homework

8th Grade

15 Qs

Cyber Security

Cyber Security

6th - 8th Grade

7 Qs

Term Recap

Term Recap

8th Grade

11 Qs

Cybersecurity - L3 Recap

Cybersecurity - L3 Recap

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Richard Colebrooke

Used 27+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does OSINT stand for?

Open Source Intelligence

Open Source Interals

Official Secure Information Neutralisation

Official Standard Intelligence Technology

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What types of information are hackers looking for when performing an OSINT attack?

(select all that apply)

Addresses

Jobs

Devices used

Family

How funny someone is

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a way hackers use information obtained through OSINT?

Access accounts

Make other attacks seem more believable

Take control of devices

Send the target a funny joke

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these can help protect against OSINT attacks?

Don't post personal information online

Never post fake information

Trust everyone online

Uncheck all privacy options

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call the 'scrambling' of data?

Encryption

Googling

Chopping

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is encryption important?

Prevents hackers reading data

Prevents hackers accessing data

Prevents hackers copying data

Prevents hackers from going to prison

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hacker is being described here?

'Not everything they do is legal/with permission'

Black Hat

Grey Hat

White Hat

None of these

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?