cybersecurity Do now week2

cybersecurity Do now week2

12th Grade

7 Qs

quiz-placeholder

Similar activities

Network Security Appliances

Network Security Appliances

12th Grade

12 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

malwares

malwares

12th Grade

8 Qs

Healthy Computing

Healthy Computing

9th Grade - University

10 Qs

Computer Hardware - RAM & ROM Differences

Computer Hardware - RAM & ROM Differences

4th - 12th Grade

10 Qs

Data Representation - Sound

Data Representation - Sound

2nd - 12th Grade

10 Qs

Computer Hardware - Cache Memory

Computer Hardware - Cache Memory

4th - 12th Grade

10 Qs

Websites in Our Daily Lives

Websites in Our Daily Lives

12th Grade

10 Qs

cybersecurity Do now week2

cybersecurity Do now week2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Mai Barakat

Used 6+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is cybersecurity

the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, and damage.

the smart devices

social media

the hackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

true or false?
phishing is one type of cybersecurity?

true

false

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

true or false?
smart phone is type of cyber attacks?

true

false

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three basic principles of cybersecurity are :

trust, integrity, and availability

confidentiality, integrity, and availability

reality and availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:
Phishing attacks are attempts to obtain sensitive information such as passwords, credit card details, or personal data.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:

Malware is a type of software designed to damage, disrupt, or steal information from a computer system

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


.................. are tactics used to trick individuals into revealing sensitive information or performing actions that can harm a system or organization.

phishing

Social engineering attacks

Malware