Search Header Logo

CSF 6.1 - What is Cybersecurity?

Authored by Natalie McIntosh

Computers

9th Grade

CSF 6.1 - What is Cybersecurity?
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

49 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What was the initial purpose of ARPANET?

To create a global network for everyone to use

To link computers at research institutions over telephone lines

To protect data from cyber attacks

To develop a new form of digital currency

Answer explanation

The initial purpose of ARPANET was to link computers at research institutions over telephone lines.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the CIA triad stand for?

Confidentiality, Integrity, and Availability

Computing, Information, and Access

Cryptography, Internet, and ARPANET

Cybersecurity, Intelligence, and Authentication

Answer explanation

The CIA triad stands for Confidentiality, Integrity, and Availability, making it the correct choice.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is phishing?

A type of malware

A social engineering attack to steal personal information via email

A method to create secure data on a computer system

A programming code that harms computers

Answer explanation

Phishing is a social engineering attack to steal personal information via email.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is spear phishing?

A general term for any kind of phishing attack

A phishing attack that targets a specific company or organization

A very targeted and tailored approach to phishing

A phishing attack that uses phone calls instead of emails

Answer explanation

Spear phishing is a very targeted and tailored approach to phishing, focusing on specific individuals or organizations to increase the likelihood of success.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a vulnerability in the context of cybersecurity?

A strong password that protects user accounts

A flaw or mistake that happens during the process of coding devices

A type of phishing attack

A method to encrypt data

Answer explanation

A vulnerability in cybersecurity refers to a flaw or mistake that occurs during the coding process of devices, making them susceptible to exploitation by attackers.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is an exploit?

A secure method to protect data on a computer system

A phishing technique

An attack that takes advantage of vulnerabilities to cause unintended actions or to gain access to secure data on a computer system

A type of digital currency

Answer explanation

An exploit is an attack that takes advantage of vulnerabilities to cause unintended actions or to gain access to secure data on a computer system.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is cryptocurrency?

A new operating system for mobile devices

A type of malware

A programming language for creating secure applications

A decentralized, digital or virtual form of currency that uses peer-to-peer technologies to take instant payment when buying or selling products or services

Answer explanation

Cryptocurrency is a decentralized, digital or virtual form of currency that uses peer-to-peer technologies for instant payments when buying or selling products or services.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?