Intro to Cybersecurity

Intro to Cybersecurity

10 Qs

quiz-placeholder

Similar activities

Textos académicos

Textos académicos

University

8 Qs

LibreCAD

LibreCAD

10th Grade

15 Qs

Yak

Yak

KG - University

10 Qs

EIDGLITZ TRIVIA DAY 4!!

EIDGLITZ TRIVIA DAY 4!!

KG - University

10 Qs

Volume

Volume

KG

11 Qs

Brojevni sustavi i logički sklopovi 3C

Brojevni sustavi i logički sklopovi 3C

KG - University

10 Qs

NOM-065

NOM-065

University

9 Qs

Induction Trivia Questions— English

Induction Trivia Questions— English

University

9 Qs

Intro to Cybersecurity

Intro to Cybersecurity

Assessment

Quiz

others

Practice Problem

Hard

Created by

Mr Applewhaite

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which topic are you studying this term?

Computer Networks

Cybercrime

Cyber Threats

Cybersecurity

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

When data has been processed and is meaningful, which of these has it become?

Data
information

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Is the following data or information: "Sophie got 38 out of 40 on her English test"

Data
Information

4.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

Why might a company collect information about you to form a profile? (Which two of the following apply?)

So they can target you to sell products or services that you have bought or liked
They can sell information to marketing companies.
Sell new products with a larger markup

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the purpose of the Data Protection Act?

To protect an organisation from hackers
Requires organisations that store data on individuals to use it responsibly and keep it safe.
To act as a deterrent to cyber criminals who try to steal data on people.
To prevent cybercriminals from spreading viruses

6.

OPEN ENDED QUESTION

30 sec • Ungraded

State the 8 principles of data protection

Evaluate responses using AI:

OFF

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Identify which malware requires the user to pay a ransom.

Adware
Spyware
Ransomware
DDOS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?