Digital security risks online

Digital security risks online

8th Grade

7 Qs

quiz-placeholder

Similar activities

File Handling Quiz

File Handling Quiz

8th Grade

11 Qs

know your India

know your India

6th - 8th Grade

6 Qs

THIRD PERIODIC EXAM IN ICT 8

THIRD PERIODIC EXAM IN ICT 8

8th Grade

5 Qs

UH INFORMATIKA KELAS 8

UH INFORMATIKA KELAS 8

8th Grade

10 Qs

Digital security risks online

Digital security risks online

Assessment

Quiz

Others

8th Grade

Practice Problem

Hard

Created by

Hamda Almansoori

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which word belongs to the picture representing?

Unethical employee

Corporate spy

Cyber extortionist

Cyber warfare

Cyber terrorist

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Computer crime?

An online or internet-based illegal act.

Any illegal act involving the use of a computer or related devices.

Software used bye cybercriminals.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hacker?

Someone who access a computer or a network illegally but has the intent of improving security.

Someone who accesses a computer or a network illegally but has the intent of destroying and stealing data or other malicious actions.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who has excellent computer and networking skills.

Cyber extortionist

Corporate spy

Cyber warfare

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who uses the internet or network to destroy or damage computers for political reasons.

Cyber terrorist

Corporate spy

Cyber extortionist

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who access a computer or a network illegally but doesn’t have the technical skills and knowledge

Cyber terrorist

Script kiddie

Corporate spy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack whose goal ranges from disabling the governments computer network to crippling a country.

Cyber extortionist

Corporate spy

Cyber warfare

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?