Year 9 - Cybersecurity

Quiz
•
Computers
•
6th - 8th Grade
•
Hard

O Moore
Used 235+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which UK law gives you the right to access the data an organisation stores on you?
The Freedom of Information Act
The Computer Misuse Act
The Data Protection Act
The Copyright, Designs, and Patents Act
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When data has been processed and is meaningful, which of these has it become?
Information
Processed data
Identifiable data
Profiled
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the Data Protection Act?
To protect an organisation from hackers
To require organisations that store data on people to use it responsibility and keep it safe
To act as a deterrent to cybercriminals who try to steal data on people
To prevent cybercriminals from spreading a virus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is social engineering?
Methods used by cybercriminals to deceive individuals into handing over information
Hacking a system by taking control of someone else's computer
Using the computer of someone who has accidently left themselves logged on
A malicious attempt to disrupt a server or network by flooding it with internet traffic
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?
Shouldering
Phishing
Spam
Blagging
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a name generator attack?
Software used to randomly create accounts that post to social media
Attackers create an online quiz to produce a name; the answers to the quiz find out key pieces of information that can help them to answer the security questions protecting people's accounts
An attack that makes multiple attempts to guess a username and password
A form of identity theft conducted online
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
‘Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?
Hacking
Viruses
Social engineering
Phishing
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Cybersecurity Fundamentals Week 3 Quiz

Quiz
•
KG - University
19 questions
Networks Recap Quiz

Quiz
•
8th Grade
10 questions
Malware Introduction

Quiz
•
5th - 10th Grade
20 questions
Today's Technology - Lesson 2 - Grade8

Quiz
•
8th Grade
20 questions
Network topologies

Quiz
•
8th Grade - University
10 questions
Business Management

Quiz
•
6th - 8th Grade
10 questions
AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

Quiz
•
8th - 10th Grade
20 questions
Cyber Security Basics

Quiz
•
8th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
8 questions
Time Management

Quiz
•
6th Grade
18 questions
Digital Footprint

Quiz
•
6th Grade
20 questions
typing

Quiz
•
6th Grade
18 questions
Company Logos

Quiz
•
6th - 8th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade
25 questions
How to Email a Teacher- https://youtu.be/NioeNhfpVfI

Quiz
•
6th - 8th Grade