Cybersecurity Lesson 1

Cybersecurity Lesson 1

12th Grade

8 Qs

quiz-placeholder

Similar activities

Penilaian Harian-1, Pemrograman Berorientasi Objek (PBO)

Penilaian Harian-1, Pemrograman Berorientasi Objek (PBO)

12th Grade

10 Qs

Recap

Recap

12th Grade

10 Qs

Computer Basics 2 - CESA

Computer Basics 2 - CESA

7th Grade - University

10 Qs

WAN Sesi 1

WAN Sesi 1

1st Grade - University

10 Qs

Quiz #2 ETEC 486 | Spr. 16

Quiz #2 ETEC 486 | Spr. 16

KG - University

10 Qs

HARD DISK DRIVE

HARD DISK DRIVE

11th - 12th Grade

10 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

Cybersecurity Lesson 1

Cybersecurity Lesson 1

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When data has been processed and is meaningful, which of these has it become?

Information

Processed data

Identifiable data

Profiled data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is the following data or information: "Sophie got 38 out of 40 on her English test"

Data

Information

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Why might a company collect information about you to form a profile? (Which two of the following apply?)

So that they can recommend products to you based on previous products you have purchased or viewed

So that they can sell the information to marketing companies

So that they can sell the information onto cybercriminals without your permission

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Data Protection Act?

To protect an organisation from hackers

To require organisations that store data on people to use it responsibility and keep it safe

To act as a deterrent to cybercriminals who try to steal data on people

To prevent cybercriminals from spreading a virus

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

___________is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes. 

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _______attack is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.​

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money. ​

8.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Shoulder surfing is an attack designed to steal a victim's password or other sensitive data.