ICT Cybersecurity L4-Protect Device & Security Threats

ICT Cybersecurity L4-Protect Device & Security Threats

6th - 8th Grade

20 Qs

quiz-placeholder

Similar activities

FUNCTIONS OF PC DEVICES

FUNCTIONS OF PC DEVICES

4th - 7th Grade

15 Qs

Basic Operations and Concepts

Basic Operations and Concepts

6th Grade

20 Qs

Computers, Information Processing & Storage

Computers, Information Processing & Storage

6th Grade

19 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

Computer Fundamentals Quiz

Computer Fundamentals Quiz

7th - 8th Grade

20 Qs

Cybersecurity 1

Cybersecurity 1

8th Grade

18 Qs

Y7 - Cybersecurity

Y7 - Cybersecurity

6th Grade

19 Qs

Basic Computer Skills

Basic Computer Skills

7th Grade - University

20 Qs

ICT Cybersecurity L4-Protect Device & Security Threats

ICT Cybersecurity L4-Protect Device & Security Threats

Assessment

Quiz

Computers

6th - 8th Grade

Medium

Created by

NICOLE STEPHENS

Used 10+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be considered a strong password?

joesmithpelicanmiddleschool

Kim12345

mydogSpot

JLP17#butterflies

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When visiting a website, you notice a lock icon in the bottom right corner of the browser window. What does the lock represent?

A link to open another website.

A program that prevents you from leaving the page.

A webpage that has a secure connection.

A warning that you do not have permission to view this webpage.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following options is an example of a scam?

Your brother sends you a text message on your mobile device.

A friend sends you an email asking you to lend them some money.

Your teacher sends you an email with the homework.

A pop-up appears in your online game urging you to click on the image.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term describes a self-replicating program that disrupts the normal functioning of a computer?

Phishing

Worm

Plagiarism

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Viruses, worms, and trojans are common security threats that are frequently used in the dissemination of:

malware

passwords

scams

downloads

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are creating a new online account. Which provided information should be strong and hard to decipher?

A username

A picture of yourself

An email address

A password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While Trish was playing an online game, a pop-up appeared asking her to click on the flashing lights to receive more points for her game. What should she do?

Click on the flashing lights.

Turn off the game and console.

Save the pop-up message until she really needs extra points to win.

Click on the X in the corner of the pop-up to make it disappear.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?