ICT CyberSecurity Practice Test B

ICT CyberSecurity Practice Test B

8th Grade

20 Qs

quiz-placeholder

Similar activities

Chapter 2_Cutural Dimensions

Chapter 2_Cutural Dimensions

1st Grade - University

20 Qs

Chapter 14 Test Review - Civics 8

Chapter 14 Test Review - Civics 8

7th - 12th Grade

19 Qs

QUIZ 1 : TOPIC 5 [MANUFACTURING OVERHEAD]

QUIZ 1 : TOPIC 5 [MANUFACTURING OVERHEAD]

1st Grade - University

20 Qs

Giełda Papierów Wartościowych

Giełda Papierów Wartościowych

1st Grade - Professional Development

23 Qs

QUIZ 4 : TOPIC 8 [PROCESS COSTING]

QUIZ 4 : TOPIC 8 [PROCESS COSTING]

1st Grade - University

20 Qs

Business Documentation/Documents

Business Documentation/Documents

7th - 12th Grade

20 Qs

Quiz 1 - Money Today

Quiz 1 - Money Today

7th - 8th Grade

17 Qs

businesss

businesss

1st Grade - Professional Development

18 Qs

ICT CyberSecurity Practice Test B

ICT CyberSecurity Practice Test B

Assessment

Quiz

Business

8th Grade

Easy

Created by

Salam Shuhaiber

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Bart is new to social networking and wants to stay safe. He asks his cousin what information he should post and what he should not. His cousin, who has taken a cybersecurity class, recommends that Bart never post:

information about his last vacation.

pictures of himself with friends.

a list of his top ten favorite movies.


his address or phone number.

Answer explanation

While using any social networking sites, do not publicly share personal information such as your address or phone number.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are using a public computer in the lobby of a hotel. What is something that you should be aware of while using this computer?

There may be malware on the computer that is capturing any personal information you enter on it, such as user names and passwords.

Public computers are usually safe to use because they run the latest security software.

You will be prevented from accessing any site that would require you to enter personal information.

There may be malware on the computer that could damage any file you use on it, but that poses no threat to your personal information.

Answer explanation

Malware is any type of software that is designed to damage your computer or gain unauthorized access to your personal information.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt


April gives her friend a Web site address. She recommends that her friend check it out and possibly sign-up. April explains that the Web site is for a group of friends to use to connect with each other. Which of the following best describes the type of Web site April is recommending?

Social network

Wiki

Collaborative group


Online gaming

Answer explanation


A social network is defined as an online group of people that share a common interest and use a Web site to communicate with each other.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt


:Gale has been seeing many hurtful messages about her friend Bob on a popular social networking site. The messages have spread all over her school. What should Gale do?


option

B

Gale should tell Bob about the messages.

Gale should discuss the messages with her friends.

Gale should ignore the messages.


Gale should speak to someone in authority.

Answer explanation


Gale should speak to a counselor or trusted adult. Cyberbullying can create a disruptive environment at school and is often related to in-person bullying. The school can use the information to help inform prevention and response strategies.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt


What is one of the possible consequences for posting inappropriate images through social media?

There are no consequences for this behavior.

You could get in trouble with the law.


Your family would be proud.


You could win academic awards.

Answer explanation

There are many consequences associated with posting inappropriate images through social media. Some include: removal from athletic teams/clubs, suspension from school, police involvement, and public embarrassment if photos are shared with unintended recipients. Photos may resurface any time, even years later, to be seen by colleges, employers, family or friends. Also consider the risk of attracting individuals with malicious intent.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt


Mr. Jones gave a lesson on how following a set of rules for acceptable online communication is important. What has Mr. Jones been teaching his class?

Netiquette


Cyberbullying


Social Networking


Malware

Answer explanation


Netiquette suggests rules for appropriate online communications. Another term used is "network etiquette."

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

:Mrs. Polly thinks one of her students has downloaded some software that she believes will harm the school computers. What type of software does Mrs. Polly think was downloaded?

Spyware

Malwareand

Anti-virus

Adware

Answer explanation


Malicious software — also called malware — is created with the intent of causing harm to a computer or its use

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Business