Cyber security

Cyber security

12th Grade

10 Qs

quiz-placeholder

Similar activities

Computer Health and Safety

Computer Health and Safety

9th - 12th Grade

10 Qs

KS3 - Fun Computing Quiz 2

KS3 - Fun Computing Quiz 2

4th - 12th Grade

10 Qs

OSHA 10 Review Lessons 11-14

OSHA 10 Review Lessons 11-14

9th - 12th Grade

12 Qs

Multimedia Interaktif-Part3

Multimedia Interaktif-Part3

10th - 12th Grade

10 Qs

Digital Communication II

Digital Communication II

5th Grade - University

15 Qs

Margaret Hamilton

Margaret Hamilton

4th Grade - University

13 Qs

Fraud

Fraud

KG - Professional Development

13 Qs

Introduction to Digital Technology

Introduction to Digital Technology

12th Grade

10 Qs

Cyber security

Cyber security

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Victoria Price

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes

Society engineering

Social endangering

Social engineering

Social escaping

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is different about social engineering, in comparison to other cybercrimes?

Machines tricking machines

Humans tricking humans

Humans tricking machines

Machines tricking humans

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call an attack that involves the attacker watching the victim while they provide sensitive information?

Shoulder somersaulting

Shoulder suggesting

Shoulder singing

Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call attacks in which the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name?

Name generator

Word generator

Guess generator

People generator

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the name of an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data?


Praying

Phishing

Wishing

Singing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money?

Blinking

Blasting

Blogging

Blagging

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Greatest F1 driver of all time

Lewis Hamilton

Lewis Hamilton

Lewis Hamilton

Lewis Hamilton

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?