CyberSecurity Basics 226

CyberSecurity Basics 226

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

To Change or Not to Change?

To Change or Not to Change?

12th Grade

10 Qs

Introducción a las Redes de Datos

Introducción a las Redes de Datos

11th Grade

10 Qs

Computer Quiz For NM(06.05.2021)

Computer Quiz For NM(06.05.2021)

11th - 12th Grade

15 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

HEALTH AND SAFETY 9

HEALTH AND SAFETY 9

7th - 9th Grade

11 Qs

OCR GCSE CS - 2.1 ERL sorts and searches

OCR GCSE CS - 2.1 ERL sorts and searches

10th - 11th Grade

9 Qs

INTRODUCCION A LA PROGRAMACION

INTRODUCCION A LA PROGRAMACION

6th Grade - University

10 Qs

Wifi y bluetooth

Wifi y bluetooth

10th Grade

10 Qs

CyberSecurity Basics 226

CyberSecurity Basics 226

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Mr Minyard

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The act of gaining unauthorized access to a computer, network, or system is called hacking. It can be done for various purposes, such as curiosity, learning, testing, espionage, sabotage, or theft. It can be ethical or unethical, depending on the motivation and legality of the act.

What is the name of the act of gaining unauthorized access to a computer, network, or system?

Social Engineering

Malware

Hacking

Phishing

Unauthorized Accessing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware—short for “malicious software”—is software specifically designed to gain unauthorized access to or damage a device, typically without the owner’s knowledge. Common types of malware include:

Viruses: malware designed to change, corrupt, or destroy information that is then passed on to other systems.

Spyware: malware that is used by hackers to spy on your computer or mobile phone activities.

What is a general name for bad software on a person's device?

Dangerous Code

Cyber Insecurity

Badware

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Here are a few common cybersecurity terms:

Network: interconnected digital devices that can exchange data with one another

Internet protocol (IP) address: a unique numerical identifier assigned to every device with internet access 

Virtual private network (VPN): an encrypted internet connection from a device to a network

What thing can secure a device's network connection?

Internet Protocol

Virtual Private Network

Ethernet Connection

Wi-Fi Security

Cybersecurity Training

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The field of study of protecting computers, networks, and data from unauthorized access, use, or damage is known as cybersecurity. It involves both technical and human aspects, such as software, hardware, policies, and training. Cybersecurity is important because it protects the privacy, integrity, and availability of information and systems.

What is the term for the practice of protecting computers, networks, and data from unauthorized access, use, or damage?


Computer Networks

Information and Systems

Unauthorized Access

Cybersecurity

Protecting Computers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A bug is a mistake or error in a program that causes it to work incorrectly or not at all. A bug can be caused by many factors, such as typing errors, logic errors, or design errors. A bug can be fixed by finding and correcting the source of the problem.

What is another word for a mistake or error in a program?


Loop

Function

Variable

Bug

String

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A pixel is a tiny dot of color on a screen or an image. A pixel can have different colors and brightness. It is the smallest unit of a digital image. Many pixels together can form a picture or computer graphics.

What is the smallest unit of a digital image?

Computer Graphics

Pixel

Dot

Screen

Digital Image

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cybersecurity refers to every aspect of protecting critical systems, devices, and sensitive data against cyberattacks. 

Hacker (black hat): a malicious person who attempts to gain unauthorized access to a network with the intent to cause damage or theft

Hacker (white hat): A person who attempts to gain unauthorized access to a network in order to identify and patch vulnerabilities in a security system.

What is the title of an employee who finds and fixes security vulnerabilities?

White Hat Hacker

Black Hat Hacker

Hatless Hacker

Vulnerabilities

Cybersecurity

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?