Cybersecurity Lesson 1

Cybersecurity Lesson 1

12th Grade

8 Qs

quiz-placeholder

Similar activities

Quiz # 3 Asignacion

Quiz # 3 Asignacion

7th - 12th Grade

10 Qs

COMPUETR AND NETWORK

COMPUETR AND NETWORK

9th - 12th Grade

11 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Riviosn_internet threats & computer system

Riviosn_internet threats & computer system

9th - 12th Grade

13 Qs

Cyber Security

Cyber Security

12th Grade

10 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

2.6 Social Engineering 3

2.6 Social Engineering 3

12th Grade

12 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

Cybersecurity Lesson 1

Cybersecurity Lesson 1

Assessment

Quiz

Computers

12th Grade

Hard

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When data has been processed and is meaningful, which of these has it become?

Information

Processed data

Identifiable data

Profiled data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is the following data or information: "Sophie got 38 out of 40 on her English test"

Data

Information

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Why might a company collect information about you to form a profile? (Which two of the following apply?)

So that they can recommend products to you based on previous products you have purchased or viewed

So that they can sell the information to marketing companies

So that they can sell the information onto cybercriminals without your permission

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Data Protection Act?

To protect an organisation from hackers

To require organisations that store data on people to use it responsibility and keep it safe

To act as a deterrent to cybercriminals who try to steal data on people

To prevent cybercriminals from spreading a virus

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

___________is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes. 

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _______attack is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.​

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money. ​

8.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Shoulder surfing is an attack designed to steal a victim's password or other sensitive data.