Cybersecurity Vocabulary Quiz

Cybersecurity Vocabulary Quiz

6th Grade

10 Qs

quiz-placeholder

Similar activities

P6 Ch5-6 Chapter Quiz

P6 Ch5-6 Chapter Quiz

6th Grade

10 Qs

Reported speech - Wh question

Reported speech - Wh question

1st - 12th Grade

13 Qs

BI-YEAR 1

BI-YEAR 1

1st - 10th Grade

10 Qs

Assessment - Comparatives

Assessment - Comparatives

6th Grade

10 Qs

Quiz Zero Conditional Sixth Grade

Quiz Zero Conditional Sixth Grade

6th - 7th Grade

15 Qs

Idioms-Mrs. Clark's Class

Idioms-Mrs. Clark's Class

6th Grade

10 Qs

Before an online lesson

Before an online lesson

4th Grade - Professional Development

11 Qs

Harry Houdini

Harry Houdini

6th Grade

10 Qs

Cybersecurity Vocabulary Quiz

Cybersecurity Vocabulary Quiz

Assessment

Quiz

English

6th Grade

Practice Problem

Medium

CCSS
RI.4.10, RI.5.10, RI.6.4

+2

Standards-aligned

Created by

Noe Garza

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above.

Authentication

Botnet

Data Breach

Ddos

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

DDos is an acronym for __________.

Tags

CCSS.RI.4.10

CCSS.RI.5.10

CCSS.RI.6.4

CCSS.RI.7.4

CCSS.RI.8.4

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. The result of a hacker successfully breaking into a system, gaining control of its network and exposing its data, usually personal data covering items such as credit card numbers, bank account numbers, Social Security numbers, and more.

Data Breach

Spoofing

Phishing

Trojan Horse

4.

DROPDOWN QUESTION

1 min • 1 pt

A ​ (a)   is malware which changes, corrupts, or destroys information, and is then passed on to other systems, usually by otherwise benign means (e.g. sending an email). In some cases, a virus can actually cause physical damage.

virus
sickness
disease

Tags

CCSS.RI.4.10

CCSS.RI.5.10

CCSS.RI.6.4

CCSS.RI.7.4

CCSS.RI.8.4

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Please select all choices that true about a VPN.

stands for Virtual Private Network

Users have anonymity by having a private encrypted network through replaciing the IP address with a VPN created address, making it harder for hackers to attack.

Make your IP address visibile.

It is a type of virus.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Any technology, be it software or hardware, used to keep intruders out is ________.

Waterwall

Firewall

VPN

Antivirus

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The opposite of the hacker,black hat is the _________.

Tags

CCSS.RI.4.10

CCSS.RI.5.10

CCSS.RI.6.4

CCSS.RI.7.4

CCSS.RI.8.4

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?