
CyberSecurity Basics 226
Authored by Mr Minyard
Computers
9th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The act of gaining unauthorized access to a computer, network, or system is called hacking. It can be done for various purposes, such as curiosity, learning, testing, espionage, sabotage, or theft. It can be ethical or unethical, depending on the motivation and legality of the act.
What is the name of the act of gaining unauthorized access to a computer, network, or system?
Social Engineering
Malware
Hacking
Phishing
Unauthorized Accessing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware—short for “malicious software”—is software specifically designed to gain unauthorized access to or damage a device, typically without the owner’s knowledge. Common types of malware include:
Viruses: malware designed to change, corrupt, or destroy information that is then passed on to other systems.
Spyware: malware that is used by hackers to spy on your computer or mobile phone activities.
What is a general name for bad software on a person's device?
Dangerous Code
Cyber Insecurity
Badware
Malware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Here are a few common cybersecurity terms:
Network: interconnected digital devices that can exchange data with one another
Internet protocol (IP) address: a unique numerical identifier assigned to every device with internet access
Virtual private network (VPN): an encrypted internet connection from a device to a network
What thing can secure a device's network connection?
Internet Protocol
Virtual Private Network
Ethernet Connection
Wi-Fi Security
Cybersecurity Training
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The field of study of protecting computers, networks, and data from unauthorized access, use, or damage is known as cybersecurity. It involves both technical and human aspects, such as software, hardware, policies, and training. Cybersecurity is important because it protects the privacy, integrity, and availability of information and systems.
What is the term for the practice of protecting computers, networks, and data from unauthorized access, use, or damage?
Computer Networks
Information and Systems
Unauthorized Access
Cybersecurity
Protecting Computers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A bug is a mistake or error in a program that causes it to work incorrectly or not at all. A bug can be caused by many factors, such as typing errors, logic errors, or design errors. A bug can be fixed by finding and correcting the source of the problem.
What is another word for a mistake or error in a program?
Loop
Function
Variable
Bug
String
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A pixel is a tiny dot of color on a screen or an image. A pixel can have different colors and brightness. It is the smallest unit of a digital image. Many pixels together can form a picture or computer graphics.
What is the smallest unit of a digital image?
Computer Graphics
Pixel
Dot
Screen
Digital Image
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cybersecurity refers to every aspect of protecting critical systems, devices, and sensitive data against cyberattacks.
Hacker (black hat): a malicious person who attempts to gain unauthorized access to a network with the intent to cause damage or theft
Hacker (white hat): A person who attempts to gain unauthorized access to a network in order to identify and patch vulnerabilities in a security system.
What is the title of an employee who finds and fixes security vulnerabilities?
White Hat Hacker
Black Hat Hacker
Hatless Hacker
Vulnerabilities
Cybersecurity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN
Quiz
•
11th Grade
10 questions
Cos’è la ROM?
Quiz
•
6th - 12th Grade
10 questions
hardware and software(g3)
Quiz
•
2nd - 10th Grade
10 questions
EMPTECH L4 Q3
Quiz
•
12th Grade
15 questions
KD 3.1_Aplikasi Pengolah Angka / Spreadsheet
Quiz
•
10th Grade
10 questions
Microcontroller
Quiz
•
11th Grade - University
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
11 questions
Robotica 2018
Quiz
•
5th - 9th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade