ICT digital security risk

ICT digital security risk

8th Grade

7 Qs

quiz-placeholder

Similar activities

Video game characters LSMS

Video game characters LSMS

3rd - 8th Grade

10 Qs

Computer Science: Computer Systems

Computer Science: Computer Systems

6th Grade - University

10 Qs

Blog Quiz

Blog Quiz

6th - 10th Grade

11 Qs

What is an Engineer?

What is an Engineer?

5th - 9th Grade

6 Qs

Social media influencers

Social media influencers

6th - 12th Grade

10 Qs

21 Things Basics

21 Things Basics

7th - 8th Grade

10 Qs

cyber security

cyber security

8th Grade

12 Qs

Revision quiz on Access

Revision quiz on Access

8th Grade

12 Qs

ICT digital security risk

ICT digital security risk

Assessment

Quiz

Computers

8th Grade

Practice Problem

Hard

Created by

Amna Almansoori

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a digital security risk?

Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability

its when someone sabotages your mobile device

When a hacker places a virus into your computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define hacker

Someone who illegally accesses the network without any technical skills and knowledge

Someone who accesses a computer or a network illegally but has the intent of improving security

Someone who works very well with the computers and networking skills

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A corporate spy is someone who has excellent computer and networking skills.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cracker is someone who breaks into his employer’ computers for revenge.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define Cyber Extortionist

Someone who has the intent of hacking into an organization’s security for financial gains.

Someone who plays games on a computer.

Someone who demands to stop an attack on an organization’s technology infrastructure.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An _____ Has the intent of breaking into his employer’s computer for exploiting a security weakness.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _____ is planning on hacking into a computer network illegally for a heist.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?