cybersecurity Do now week2

cybersecurity Do now week2

12th Grade

7 Qs

quiz-placeholder

Similar activities

Working with tables

Working with tables

5th - 12th Grade

10 Qs

Technology Week HTG Quiz - Monday

Technology Week HTG Quiz - Monday

7th - 12th Grade

10 Qs

RPMS - IPCRF by Jenelou John Israel

RPMS - IPCRF by Jenelou John Israel

12th Grade

10 Qs

YouCode Scratch Quiz

YouCode Scratch Quiz

KG - 12th Grade

10 Qs

Weekly Quiz 1

Weekly Quiz 1

4th Grade - Professional Development

10 Qs

RECAPS

RECAPS

12th Grade

10 Qs

Network Security Appliances

Network Security Appliances

12th Grade

12 Qs

ETWINNING SID EVENT 24

ETWINNING SID EVENT 24

1st - 12th Grade

10 Qs

cybersecurity Do now week2

cybersecurity Do now week2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Mai Barakat

Used 6+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is cybersecurity

the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, and damage.

the smart devices

social media

the hackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

true or false?
phishing is one type of cybersecurity?

true

false

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

true or false?
smart phone is type of cyber attacks?

true

false

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three basic principles of cybersecurity are :

trust, integrity, and availability

confidentiality, integrity, and availability

reality and availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:
Phishing attacks are attempts to obtain sensitive information such as passwords, credit card details, or personal data.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:

Malware is a type of software designed to damage, disrupt, or steal information from a computer system

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


.................. are tactics used to trick individuals into revealing sensitive information or performing actions that can harm a system or organization.

phishing

Social engineering attacks

Malware