Search Header Logo

CyberSecurity Basics 226

Authored by Mr Minyard

Computers

9th - 12th Grade

Used 4+ times

CyberSecurity Basics 226
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The act of gaining unauthorized access to a computer, network, or system is called hacking. It can be done for various purposes, such as curiosity, learning, testing, espionage, sabotage, or theft. It can be ethical or unethical, depending on the motivation and legality of the act.

What is the name of the act of gaining unauthorized access to a computer, network, or system?

Social Engineering

Malware

Hacking

Phishing

Unauthorized Accessing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware—short for “malicious software”—is software specifically designed to gain unauthorized access to or damage a device, typically without the owner’s knowledge. Common types of malware include:

Viruses: malware designed to change, corrupt, or destroy information that is then passed on to other systems.

Spyware: malware that is used by hackers to spy on your computer or mobile phone activities.

What is a general name for bad software on a person's device?

Dangerous Code

Cyber Insecurity

Badware

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Here are a few common cybersecurity terms:

Network: interconnected digital devices that can exchange data with one another

Internet protocol (IP) address: a unique numerical identifier assigned to every device with internet access 

Virtual private network (VPN): an encrypted internet connection from a device to a network

What thing can secure a device's network connection?

Internet Protocol

Virtual Private Network

Ethernet Connection

Wi-Fi Security

Cybersecurity Training

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The field of study of protecting computers, networks, and data from unauthorized access, use, or damage is known as cybersecurity. It involves both technical and human aspects, such as software, hardware, policies, and training. Cybersecurity is important because it protects the privacy, integrity, and availability of information and systems.

What is the term for the practice of protecting computers, networks, and data from unauthorized access, use, or damage?


Computer Networks

Information and Systems

Unauthorized Access

Cybersecurity

Protecting Computers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A bug is a mistake or error in a program that causes it to work incorrectly or not at all. A bug can be caused by many factors, such as typing errors, logic errors, or design errors. A bug can be fixed by finding and correcting the source of the problem.

What is another word for a mistake or error in a program?


Loop

Function

Variable

Bug

String

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A pixel is a tiny dot of color on a screen or an image. A pixel can have different colors and brightness. It is the smallest unit of a digital image. Many pixels together can form a picture or computer graphics.

What is the smallest unit of a digital image?

Computer Graphics

Pixel

Dot

Screen

Digital Image

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cybersecurity refers to every aspect of protecting critical systems, devices, and sensitive data against cyberattacks. 

Hacker (black hat): a malicious person who attempts to gain unauthorized access to a network with the intent to cause damage or theft

Hacker (white hat): A person who attempts to gain unauthorized access to a network in order to identify and patch vulnerabilities in a security system.

What is the title of an employee who finds and fixes security vulnerabilities?

White Hat Hacker

Black Hat Hacker

Hatless Hacker

Vulnerabilities

Cybersecurity

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?