OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

9th Grade

8 Qs

quiz-placeholder

Similar activities

AWQ Music Quiz

AWQ Music Quiz

9th - 12th Grade

8 Qs

Shakespeare Pre-Test

Shakespeare Pre-Test

9th Grade

10 Qs

Perkakas Perlindungan Data

Perkakas Perlindungan Data

9th Grade

10 Qs

EoEH Pg 22-27 Revision for WA3.1

EoEH Pg 22-27 Revision for WA3.1

8th - 9th Grade

10 Qs

Printmaking

Printmaking

9th - 12th Grade

8 Qs

video camera vocab

video camera vocab

9th Grade

8 Qs

Clay Basics

Clay Basics

8th - 12th Grade

11 Qs

foundations

foundations

9th - 12th Grade

12 Qs

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

Assessment

Quiz

Arts

9th Grade

Medium

Created by

Norizan Nor

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

DRAG AND DROP QUESTION

45 sec • 3 pts

What is a Critical Information Infrastructure (CII)?
A ​ (a)   that is ​ (b)   responsible for the ​ (c)   of essential services like water, energy, banking, healthcare or transportation.

directly
delivery
computer

2.

MULTIPLE SELECT QUESTION

1 min • 2 pts

In what ways do Artificial Intelligence (AI) and Internet of Things (IoT) contribute to increased cyber threats? Choose the 2 correct statements.

Many IoT devices lack security features, increasing vulnerability.

AI systems cannot be tricked to make the wrong decisions.

More connections between devices create more opportunities for cyber threats.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statement is FALSE? Tick your answer.

Phishing is a method used by cybercriminals to trick you into downloading malware only.

You may unintentionally install malware by downloading apps from unofficial sources.

Cybercriminals may use sideloading to distribute malware.

Adware, spyware and trojan horse are types of malware.

4.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the signs of malware infection on your device? Circle the 4 correct signs.

Slowing down of your device

Appearance of unknown apps on your device

Unexpected decrease in storage space in your device

Auto-activation of camera or microphone

Decrease in your device’s data usage

5.

DROPDOWN QUESTION

1 min • 4 pts

These are the 6 tips to spot phishing.

  • 1. Mismatched and

    misleading ​ (a)  

  • 2. Request for ​ (b)  

    information

  • 3. Use of urgent or

    ​ (c)   language

  • 4. Unexpected emails

  • 5. Promises of attractive ​ (d)  

  • 6. Suspicious attachments

information
personal
threatening
rewards

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Apart from being aware of phishing scams, name one other cyber tip that you can practise.
Answer: Add S C _ _ _ S_ _ _ L _ and anti-virus apps.

7.

OPEN ENDED QUESTION

3 mins • 2 pts

Discuss ONE of the reasons behind the inclusion of Digital Defence as the sixth pillar in Total Defence.

Evaluate responses using AI:

OFF

8.

VIDEO RESPONSE QUESTION

10 mins • 5 pts

Record a short We-fie video of you at the pop-up vending booth OR the photo booth the PSL has set up.

10 sec video