
Cybersecurity Vocabulary Quiz
Authored by Noe Garza
English
6th Grade
CCSS covered
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above.
The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above.
Authentication
Botnet
Data Breach
Ddos
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
DDos is an acronym for __________.
Tags
CCSS.RI.4.10
CCSS.RI.5.10
CCSS.RI.6.4
CCSS.RI.7.4
CCSS.RI.8.4
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The result of a hacker successfully breaking into a system, gaining control of its network and exposing its data, usually personal data covering items such as credit card numbers, bank account numbers, Social Security numbers, and more.
The result of a hacker successfully breaking into a system, gaining control of its network and exposing its data, usually personal data covering items such as credit card numbers, bank account numbers, Social Security numbers, and more.
Data Breach
Spoofing
Phishing
Trojan Horse
4.
DROPDOWN QUESTION
1 min • 1 pt
A (a) is malware which changes, corrupts, or destroys information, and is then passed on to other systems, usually by otherwise benign means (e.g. sending an email). In some cases, a virus can actually cause physical damage.
Tags
CCSS.RI.4.10
CCSS.RI.5.10
CCSS.RI.6.4
CCSS.RI.7.4
CCSS.RI.8.4
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Please select all choices that true about a VPN.
stands for Virtual Private Network
Users have anonymity by having a private encrypted network through replaciing the IP address with a VPN created address, making it harder for hackers to attack.
Make your IP address visibile.
It is a type of virus.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Any technology, be it software or hardware, used to keep intruders out is ________.
Any technology, be it software or hardware, used to keep intruders out is ________.
Waterwall
Firewall
VPN
Antivirus
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The opposite of the hacker,black hat is the _________.
Tags
CCSS.RI.4.10
CCSS.RI.5.10
CCSS.RI.6.4
CCSS.RI.7.4
CCSS.RI.8.4
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?