Search Header Logo

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

Authored by Norizan Nor

Arts

9th Grade

Used 1+ times

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

DRAG AND DROP QUESTION

45 sec • 3 pts

What is a Critical Information Infrastructure (CII)?
A ​ (a)   that is ​ (b)   responsible for the ​ (c)   of essential services like water, energy, banking, healthcare or transportation.

directly
delivery
computer

2.

MULTIPLE SELECT QUESTION

1 min • 2 pts

In what ways do Artificial Intelligence (AI) and Internet of Things (IoT) contribute to increased cyber threats? Choose the 2 correct statements.

Many IoT devices lack security features, increasing vulnerability.

AI systems cannot be tricked to make the wrong decisions.

More connections between devices create more opportunities for cyber threats.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statement is FALSE? Tick your answer.

Phishing is a method used by cybercriminals to trick you into downloading malware only.

You may unintentionally install malware by downloading apps from unofficial sources.

Cybercriminals may use sideloading to distribute malware.

Adware, spyware and trojan horse are types of malware.

4.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the signs of malware infection on your device? Circle the 4 correct signs.

Slowing down of your device

Appearance of unknown apps on your device

Unexpected decrease in storage space in your device

Auto-activation of camera or microphone

Decrease in your device’s data usage

5.

DROPDOWN QUESTION

1 min • 4 pts

These are the 6 tips to spot phishing.

  • 1. Mismatched and

    misleading ​ (a)  

  • 2. Request for ​ (b)  

    information

  • 3. Use of urgent or

    ​ (c)   language

  • 4. Unexpected emails

  • 5. Promises of attractive ​ (d)  

  • 6. Suspicious attachments

information
personal
threatening
rewards

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Apart from being aware of phishing scams, name one other cyber tip that you can practise.
Answer: Add S C _ _ _ S_ _ _ L _ and anti-virus apps.

(a)  

7.

OPEN ENDED QUESTION

3 mins • 2 pts

Discuss ONE of the reasons behind the inclusion of Digital Defence as the sixth pillar in Total Defence.

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?