Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Computer Crimes - Lesson Two

Computer Crimes - Lesson Two

9th Grade

21 Qs

Cambridge Nationals LO4

Cambridge Nationals LO4

10th Grade

20 Qs

Quiz #2 in Info Tech 8

Quiz #2 in Info Tech 8

10th Grade

16 Qs

Cyber Security Quiz (1)

Cyber Security Quiz (1)

9th - 12th Grade

25 Qs

EMAIL VOCABULARY

EMAIL VOCABULARY

7th - 12th Grade

16 Qs

cybersecurity hackers

cybersecurity hackers

11th Grade

15 Qs

Formal Emails

Formal Emails

12th Grade - University

20 Qs

RHS

RHS

4th Grade - Professional Development

20 Qs

 Cybersecurity

Cybersecurity

Assessment

Quiz

Computers, Other, Science

9th - 12th Grade

Medium

Created by

EUGENE SCHOECK

Used 63+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of changing plain text into ciphertext for the purpose of security or privacy?

Denial of Service

Encryption

Endpoint Protection Platform

Digital Signature

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

software that is designed to gain access to your computer with malicious intent. An umbrella term for all software that has malicious intent (viruses, worms, Trojans...)

malware

ransomware

adware

spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that encrypts programs and data until a ransom is paid to remove it.

malware

adware

ransomware

spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

unwanted software that monitors and gathers information on a person and how they use their computer

adware

ransomware

Trojan

spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of a phishing email?

The email contains poor spelling and grammar.

The email is from a government official.

The email is from a trusted source.

The email contains high-quality images.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term 'white hat hacker'?
Illegal hacker – intent on doing harm, stealing for personal gain e.g. taking credit card details.
Doesn’t necessarily steal but may access IT systems without permission which is still illegal.
Ethical hacker – paid by companies to test their systems fro vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by a 'black hat hacker'?
Doesn’t necessarily steal but may access IT systems without permission which is still illegal.
Illegal hacker – intent on doing harm, stealing for personal gain e.g. taking credit card details.
Ethical hacker – paid by companies to test their systems fro vulnerabilities.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?