cybersecurity Do now week2

cybersecurity Do now week2

12th Grade

7 Qs

quiz-placeholder

Similar activities

IT English Essentials: Unit 15 - Quiz 1

IT English Essentials: Unit 15 - Quiz 1

12th Grade

10 Qs

Introduction to Cyber Security Exam

Introduction to Cyber Security Exam

9th - 12th Grade

10 Qs

Phishing Quiz

Phishing Quiz

12th Grade

12 Qs

CyberSecurity Quiz

CyberSecurity Quiz

9th - 12th Grade

8 Qs

Welcome to Cyber Security

Welcome to Cyber Security

7th - 12th Grade

10 Qs

Cybersecurity Vocab

Cybersecurity Vocab

9th - 12th Grade

10 Qs

Cybersecurity

Cybersecurity

7th - 12th Grade

10 Qs

Social Engineering

Social Engineering

8th Grade - Professional Development

8 Qs

cybersecurity Do now week2

cybersecurity Do now week2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Mai Barakat

Used 6+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is cybersecurity

the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, and damage.

the smart devices

social media

the hackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

true or false?
phishing is one type of cybersecurity?

true

false

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

true or false?
smart phone is type of cyber attacks?

true

false

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three basic principles of cybersecurity are :

trust, integrity, and availability

confidentiality, integrity, and availability

reality and availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:
Phishing attacks are attempts to obtain sensitive information such as passwords, credit card details, or personal data.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:

Malware is a type of software designed to damage, disrupt, or steal information from a computer system

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


.................. are tactics used to trick individuals into revealing sensitive information or performing actions that can harm a system or organization.

phishing

Social engineering attacks

Malware