8RS 8.3.6 PLENARY

8RS 8.3.6 PLENARY

8th Grade

12 Qs

quiz-placeholder

Similar activities

CyberSecurity Lesson 4

CyberSecurity Lesson 4

6th - 8th Grade

13 Qs

Cybersecurity

Cybersecurity

6th - 8th Grade

13 Qs

Year 9 L6 SECURITY part 1

Year 9 L6 SECURITY part 1

8th Grade

11 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

Y8 Computer crime 2

Y8 Computer crime 2

7th - 9th Grade

10 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Cyber Security

Cyber Security

8th - 12th Grade

10 Qs

8RS 8.3.6 PLENARY

8RS 8.3.6 PLENARY

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Alexander Woolston

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity workshop, Lily explained that using fingerprints to unlock smartphones is an example of what?

A type of multi-factor authentication

A technique used to test cyber security

The use of biological data for identification

A type of malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Finley is setting up a new online account and needs to create a password. Which option would be the strongest choice for their password?

Short and simple

Contains personal information like name or birthdate

Four random words

Written down on a sticky note

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Connor is setting up his new email account and needs to choose a strong password. Which of the following options would be considered a weak password?

123456

%P@ssw0rd!

Random sequence of characters

A passphrase with more than 20 characters

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Finley is setting up their new online banking account. The bank requires Finley to use a combination of a password and a code sent to their phone. What is this an example of?

Using two authentication factors to verify identity

Using only one method to access an account

Sharing passwords with multiple users

Automatically saved passwords in a browser

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What did Olly and Lily, as cyber security testers, do in their project?

Create new types of malware

Hack into systems for malicious purposes

Test systems for vulnerabilities and security gaps

Monitor online activities of users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake noticed that when he revisits an online store, it remembers his shopping cart contents. How is this achieved?

To store sensitive information securely

To track user activity and preferences

To block access to websites

To encrypt data transmissions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity workshop, Ava learned about various types of malicious software. Which of the following did the instructor clarify is NOT a type of malware?

Virus

Spyware

Ad blocker

Ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?