Search Header Logo

Cyber Awareness Quiz

Authored by Adeeb Warsi

Other

7th Grade

Cyber Awareness Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a phishing attack?

A phishing attack is a type of social engineering attack where an attacker manipulates individuals to reveal their sensitive information.

A phishing attack is a type of cyber attack where an attacker impersonates a trustworthy entity to deceive individuals into revealing sensitive information.

A phishing attack is a type of malware attack where an attacker infects a computer system to steal sensitive information.

A phishing attack is a type of physical attack where an attacker physically assaults individuals to steal their sensitive information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a good practice for password security?

Using the same password for multiple accounts

Using a combination of uppercase and lowercase letters

Changing the password regularly

Using a common word or phrase

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

Social engineering is a term used to describe the process of building relationships and networking in a professional setting.

Social engineering is a technique used by hackers to physically break into a building.

Social engineering is a method used by attackers to manipulate individuals into revealing sensitive information or performing actions that may compromise security.

Social engineering is a method used by companies to improve their social media presence.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is data privacy important?

Data privacy is only important for businesses, not individuals.

Data privacy is not important because personal information is not valuable.

Data privacy is important because it protects individuals' personal information from being accessed, used, or shared without their consent.

Data privacy is a myth and does not actually exist.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an online scam?

Identity theft

Malware

Spoofing

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a phishing email?

To promote a new product or service.

To provide helpful information to recipients.

To encourage recipients to donate to a charity.

To trick recipients into revealing sensitive information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a recommended practice for password security?

Using a combination of uppercase and lowercase letters, numbers, and special characters.

Writing down passwords on a sticky note.

Using a single word as a password.

Using the same password for multiple accounts.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?