2. Cybersecurity Awareness(AIE)

2. Cybersecurity Awareness(AIE)

11th Grade

36 Qs

quiz-placeholder

Similar activities

Wide Area Networks (WAN)

Wide Area Networks (WAN)

9th - 12th Grade

36 Qs

G11: Communication and Networks - PART 1

G11: Communication and Networks - PART 1

11th Grade

33 Qs

Creating a Secure System (5.8 - 5.11)

Creating a Secure System (5.8 - 5.11)

9th - 12th Grade

40 Qs

CS IBDP Topic 3-Computer Network

CS IBDP Topic 3-Computer Network

10th - 11th Grade

33 Qs

033_Hardware Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

033_Hardware Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

9th Grade - University

31 Qs

Chapter 2 Basic Switch/Router Configuration

Chapter 2 Basic Switch/Router Configuration

11th Grade

40 Qs

IB Computer Science Topic 3

IB Computer Science Topic 3

10th - 11th Grade

33 Qs

Networking Essentials V2 Chapter 4 Review

Networking Essentials V2 Chapter 4 Review

9th Grade - University

41 Qs

2. Cybersecurity Awareness(AIE)

2. Cybersecurity Awareness(AIE)

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Roger Thompson

Used 2+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Imagine Nora has developed a bot to automate her social media tasks. In the context of cyber security, what is this bot?

A software application that runs automated tasks over the internet.

A physical robot that is used for hacking.

A security program designed to protect networks.

A type of malware that damages computer files.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the primary purpose of a botnet used in a scenario where Grace and Benjamin discover their company's network is under attack?

To perform large-scale network attacks.

To protect a network from malware.

To automate the marketing process.

To provide customer service through chatbots.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is an example of an employee action that can cause a vulnerability?

Installing a firewall.

Using strong passwords.

Clicking on a phishing link.

Regularly updating software.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Luna received an email from what appeared to be her bank, asking her to update her password immediately. What is this an example of?

A type of sport.

A method used by hackers to gain unauthorized access to data.

A firewall feature.

A secure way of sending emails.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Imagine Abigail receives a text message that appears to be from her bank, asking her to verify her account details. This scenario is an example of what?

Sending malicious software through SMS.

Fishing for sensitive information in corporate databases.

Smoothing out network vulnerabilities.

Sending legitimate-looking emails to obtain personal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How can bots and botnets be used in cybercrime to impact companies like those Benjamin, Noah, and Aria work for?

By automating customer service.

By performing distributed denial-of-service (DDoS) attacks on their network infrastructure.

By enhancing network security.

By providing entertainment through online games.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Imagine Nora has received an email asking for her password to update her security settings. What is the best way for her to protect against phishing attacks in this scenario?

Use simple passwords.

Share passwords with colleagues.

Regularly update software and security systems.

Open all email attachments to verify contents.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?