Search Header Logo

Cyber Threats & Solutions

Authored by William Cook McAlpine

Specialty

6th Grade

Used 7+ times

Cyber Threats & Solutions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method used by cybercriminals to trick people into giving away personal information?

Phishing

Hacking

Malware

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a strong password?

123456

password

P@ssw0rd!

qwerty

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "malware" stand for?

Malicious Software

Malfunctioning Hardware

Manual Software

Managed Software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Virus

Worm

Firewall

Trojan Horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall in cyber security?

To create viruses

To block unauthorized access

To delete files

To slow down the computer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a good practice to protect your online accounts?

Using the same password for all accounts

Sharing your password with friends

Enabling two-factor authentication

Writing your password on a sticky note

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of ransomware?

To steal personal information

To encrypt files and demand payment for decryption

To slow down the computer

To display advertisements

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?