Cybersecurity Threats

Cybersecurity Threats

8th Grade

10 Qs

quiz-placeholder

Similar activities

You and Your Data

You and Your Data

6th - 8th Grade

11 Qs

Understanding Cyber Attacks

Understanding Cyber Attacks

8th Grade

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Brute force

Brute force

8th Grade

10 Qs

Virus and threats

Virus and threats

8th Grade

10 Qs

Social Engineering

Social Engineering

8th Grade - Professional Development

8 Qs

Computer Threats

Computer Threats

KG - Professional Development

8 Qs

School Event- Networking and Cyber Security Quiz

School Event- Networking and Cyber Security Quiz

6th - 8th Grade

12 Qs

Cybersecurity Threats

Cybersecurity Threats

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Erika Ramirez

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As the Internet of Things grows, what type of cyber attack is also expected to increase?

Ransomware attacks

Distributed denial-of-service attacks

Malware attacks

Phishing attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the risk associated with millions of new unsecured devices coming online?

System lockdown

Data theft

Website shutdown

Identity theft

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack is becoming more common as more people are trying it?

Malware attack

SQL injection attack

Ransomware attack

Phishing attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the increasing use of ransomware leading to?

Data theft

System shutdown

Blackmail over personal details

Identity theft

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is forcing many companies to introduce biometric sensors to protect their data and employees?

Data theft

Password theft

Identity theft

Data breach

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common way of delivering malware and has many vulnerabilities in browser plugins?

Adobe Flash

CSS

JavaScript

HTML5

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who are the ones that can most easily compromise valuable data in a company?

Hackers

Customers

IT specialists

Employees

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?