
ICT CyberSecurity Practice Test B
Quiz
•
Business
•
8th Grade
•
Easy
Salam Shuhaiber
Used 6+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Bart is new to social networking and wants to stay safe. He asks his cousin what information he should post and what he should not. His cousin, who has taken a cybersecurity class, recommends that Bart never post:
information about his last vacation.
pictures of himself with friends.
a list of his top ten favorite movies.
his address or phone number.
Answer explanation
While using any social networking sites, do not publicly share personal information such as your address or phone number.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You are using a public computer in the lobby of a hotel. What is something that you should be aware of while using this computer?
There may be malware on the computer that is capturing any personal information you enter on it, such as user names and passwords.
Public computers are usually safe to use because they run the latest security software.
You will be prevented from accessing any site that would require you to enter personal information.
There may be malware on the computer that could damage any file you use on it, but that poses no threat to your personal information.
Answer explanation
Malware is any type of software that is designed to damage your computer or gain unauthorized access to your personal information.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
April gives her friend a Web site address. She recommends that her friend check it out and possibly sign-up. April explains that the Web site is for a group of friends to use to connect with each other. Which of the following best describes the type of Web site April is recommending?
Social network
Wiki
Collaborative group
Online gaming
Answer explanation
A social network is defined as an online group of people that share a common interest and use a Web site to communicate with each other.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
:Gale has been seeing many hurtful messages about her friend Bob on a popular social networking site. The messages have spread all over her school. What should Gale do?
option
B
Gale should tell Bob about the messages.
Gale should discuss the messages with her friends.
Gale should ignore the messages.
Gale should speak to someone in authority.
Answer explanation
Gale should speak to a counselor or trusted adult. Cyberbullying can create a disruptive environment at school and is often related to in-person bullying. The school can use the information to help inform prevention and response strategies.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is one of the possible consequences for posting inappropriate images through social media?
There are no consequences for this behavior.
You could get in trouble with the law.
Your family would be proud.
You could win academic awards.
Answer explanation
There are many consequences associated with posting inappropriate images through social media. Some include: removal from athletic teams/clubs, suspension from school, police involvement, and public embarrassment if photos are shared with unintended recipients. Photos may resurface any time, even years later, to be seen by colleges, employers, family or friends. Also consider the risk of attracting individuals with malicious intent.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Mr. Jones gave a lesson on how following a set of rules for acceptable online communication is important. What has Mr. Jones been teaching his class?
Netiquette
Cyberbullying
Social Networking
Malware
Answer explanation
Netiquette suggests rules for appropriate online communications. Another term used is "network etiquette."
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
:Mrs. Polly thinks one of her students has downloaded some software that she believes will harm the school computers. What type of software does Mrs. Polly think was downloaded?
Spyware
Malwareand
Anti-virus
Adware
Answer explanation
Malicious software — also called malware — is created with the intent of causing harm to a computer or its use
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Business Retail
Quiz
•
7th - 11th Grade
15 questions
Companies
Quiz
•
6th - 8th Grade
20 questions
Bank Accounts 17.1
Quiz
•
6th - 10th Grade
18 questions
Manufacturing
Quiz
•
7th - 8th Grade
20 questions
Instruments of Exchange
Quiz
•
7th Grade - University
20 questions
Employability Skills
Quiz
•
7th - 8th Grade
20 questions
The Federal Reserve
Quiz
•
6th - 8th Grade
15 questions
Forms of ownership
Quiz
•
8th - 10th Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
