Search Header Logo

2. Cybersecurity Awareness(AIE)

Authored by Roger Thompson

Computers

11th Grade

Used 2+ times

2. Cybersecurity Awareness(AIE)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Imagine Nora has developed a bot to automate her social media tasks. In the context of cyber security, what is this bot?

A software application that runs automated tasks over the internet.

A physical robot that is used for hacking.

A security program designed to protect networks.

A type of malware that damages computer files.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the primary purpose of a botnet used in a scenario where Grace and Benjamin discover their company's network is under attack?

To perform large-scale network attacks.

To protect a network from malware.

To automate the marketing process.

To provide customer service through chatbots.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is an example of an employee action that can cause a vulnerability?

Installing a firewall.

Using strong passwords.

Clicking on a phishing link.

Regularly updating software.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Luna received an email from what appeared to be her bank, asking her to update her password immediately. What is this an example of?

A type of sport.

A method used by hackers to gain unauthorized access to data.

A firewall feature.

A secure way of sending emails.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Imagine Abigail receives a text message that appears to be from her bank, asking her to verify her account details. This scenario is an example of what?

Sending malicious software through SMS.

Fishing for sensitive information in corporate databases.

Smoothing out network vulnerabilities.

Sending legitimate-looking emails to obtain personal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How can bots and botnets be used in cybercrime to impact companies like those Benjamin, Noah, and Aria work for?

By automating customer service.

By performing distributed denial-of-service (DDoS) attacks on their network infrastructure.

By enhancing network security.

By providing entertainment through online games.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Imagine Nora has received an email asking for her password to update her security settings. What is the best way for her to protect against phishing attacks in this scenario?

Use simple passwords.

Share passwords with colleagues.

Regularly update software and security systems.

Open all email attachments to verify contents.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?