ICT digital security risk

ICT digital security risk

8th Grade

7 Qs

quiz-placeholder

Similar activities

good quiz

good quiz

KG - Professional Development

6 Qs

11. Laws

11. Laws

8th Grade

10 Qs

technology

technology

1st - 12th Grade

10 Qs

Fundamentals of CS - Legal Considerations

Fundamentals of CS - Legal Considerations

3rd - 12th Grade

10 Qs

Information technology 3 unit 7 hackers

Information technology 3 unit 7 hackers

1st - 12th Grade

12 Qs

Computer Professionals

Computer Professionals

7th - 12th Grade

11 Qs

Basic Networking (Y8)

Basic Networking (Y8)

7th Grade - University

10 Qs

Interchange 2 Unit 7

Interchange 2 Unit 7

5th - 12th Grade

10 Qs

ICT digital security risk

ICT digital security risk

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Amna Almansoori

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a digital security risk?

Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability

its when someone sabotages your mobile device

When a hacker places a virus into your computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define hacker

Someone who illegally accesses the network without any technical skills and knowledge

Someone who accesses a computer or a network illegally but has the intent of improving security

Someone who works very well with the computers and networking skills

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A corporate spy is someone who has excellent computer and networking skills.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cracker is someone who breaks into his employer’ computers for revenge.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define Cyber Extortionist

Someone who has the intent of hacking into an organization’s security for financial gains.

Someone who plays games on a computer.

Someone who demands to stop an attack on an organization’s technology infrastructure.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An _____ Has the intent of breaking into his employer’s computer for exploiting a security weakness.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _____ is planning on hacking into a computer network illegally for a heist.

Discover more resources for Computers