Chapter 1 - Hacking

Chapter 1 - Hacking

12th Grade

7 Qs

quiz-placeholder

Similar activities

Technology and design (UNIT 4 LESSON A)

Technology and design (UNIT 4 LESSON A)

12th Grade - Professional Development

8 Qs

Expectations - Second Semester

Expectations - Second Semester

9th Grade - Professional Development

7 Qs

Netiquette Quiz

Netiquette Quiz

12th Grade

10 Qs

Startup Knowledge

Startup Knowledge

1st - 12th Grade

6 Qs

MS Teams

MS Teams

4th Grade - Professional Development

10 Qs

Investigation & Trial - PPTQ Sec 63

Investigation & Trial - PPTQ Sec 63

12th Grade

11 Qs

Quiz 5 Digital Design

Quiz 5 Digital Design

KG - Professional Development

10 Qs

MIcrosoft teams for C5

MIcrosoft teams for C5

1st Grade - Professional Development

10 Qs

Chapter 1 - Hacking

Chapter 1 - Hacking

Assessment

Interactive Video

Instructional Technology

12th Grade

Hard

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step a hacker might take if they cannot directly access your information?

Steal your physical mail

Send you a phishing email

Target your friends or family

Attack your digital devices directly

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What might a hacker do after taking over a friend or family member's account?

Delete the account

Make purchases

Attempt to contact you directly

Send a malicious attachment

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who was 'Jenny' in the hacking scenario?

The target's sister

A random contact

A made-up person

The hacker's accomplice

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why should digital identities not be treated as real people?

They don't have physical characteristics

They are often bots

You can't see them in person

You can't truly know who's behind them

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive a suspicious message from a family member?

Reply asking for more details

Ignore the message

Call to verify their identity

Forward the message to another family member

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is advised if you receive a communication from your CEO but feel uncomfortable calling them?

Ignore the communication

Talk to your manager

Ask a colleague to verify

Reply via email

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Should you automatically trust an email, phone number, or text message just because it seems familiar?

Yes, if it looks legitimate

Only if it's from a family member

No, always verify first

Yes, if it's from a work contact

Discover more resources for Instructional Technology