Cybersecurity Basics

Cybersecurity Basics

9th Grade

19 Qs

quiz-placeholder

Similar activities

Edición de Videos

Edición de Videos

7th - 9th Grade

15 Qs

Accessing the Internet

Accessing the Internet

9th - 10th Grade

15 Qs

SHEET QUIZ

SHEET QUIZ

9th - 12th Grade

15 Qs

CSS GRADE 9 - QUIZ PECs and EM

CSS GRADE 9 - QUIZ PECs and EM

9th Grade

20 Qs

CIW

CIW

9th - 12th Grade

15 Qs

Y9 Creative iMedia RO81 Quiz Part 1

Y9 Creative iMedia RO81 Quiz Part 1

9th Grade

21 Qs

Microsoft Excel

Microsoft Excel

KG - Professional Development

20 Qs

Basic Docs

Basic Docs

8th - 9th Grade

17 Qs

Cybersecurity Basics

Cybersecurity Basics

Assessment

Quiz

Computers

9th Grade

Practice Problem

Hard

Created by

Terri Koehler

Used 24+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is encryption?

The process of converting plain text into cipher text without using a key.

The process of converting plain text into cipher text using only an algorithm.

The process of converting plain text into cipher text using an algorithm and a key.

The process of converting cipher text into plain text using an algorithm and a key.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware disguises itself as a legitimate program?

Trojan horse

Spyware

Adware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall?

The purpose of a firewall is to block all incoming and outgoing network traffic.

The purpose of a firewall is to slow down network connections.

The purpose of a firewall is to protect a network from unauthorized access and potential threats.

The purpose of a firewall is to monitor network traffic for viruses and malware.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A type of cyber attack where attackers impersonate a trustworthy entity to deceive individuals into revealing sensitive information.

A type of cyber attack where attackers manipulate search engine results to redirect users to malicious websites.

A type of cyber attack where attackers send malicious software to infect a computer system.

A type of cyber attack where attackers use physical force to gain access to sensitive information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is authentication?

Confirmation of identity

Validation of identity

Authentication of identity

Verification of identity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does encryption do to data?

Encryption transforms data into a coded form.

Encryption organizes data into categories.

Encryption deletes data.

Encryption compresses data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware spreads through email attachments?

virus

worm

trojan

spyware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?