OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

9th Grade

8 Qs

quiz-placeholder

Similar activities

الموسيقى

الموسيقى

7th - 12th Grade

10 Qs

Composition

Composition

8th - 12th Grade

10 Qs

SEC 2: INTERIOR DESIGN

SEC 2: INTERIOR DESIGN

8th - 11th Grade

10 Qs

Unitary Method

Unitary Method

5th Grade - Professional Development

11 Qs

miraculous ladybug

miraculous ladybug

KG - University

6 Qs

Toma tests 040

Toma tests 040

KG - Professional Development

10 Qs

French Revolution

French Revolution

7th - 10th Grade

12 Qs

Movement, Rhythm, Repetition, and Variety

Movement, Rhythm, Repetition, and Variety

9th - 12th Grade

10 Qs

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

Assessment

Quiz

Arts

9th Grade

Practice Problem

Medium

Created by

Norizan Nor

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

DRAG AND DROP QUESTION

45 sec • 3 pts

What is a Critical Information Infrastructure (CII)?
A ​ (a)   that is ​ (b)   responsible for the ​ (c)   of essential services like water, energy, banking, healthcare or transportation.

directly
delivery
computer

2.

MULTIPLE SELECT QUESTION

1 min • 2 pts

In what ways do Artificial Intelligence (AI) and Internet of Things (IoT) contribute to increased cyber threats? Choose the 2 correct statements.

Many IoT devices lack security features, increasing vulnerability.

AI systems cannot be tricked to make the wrong decisions.

More connections between devices create more opportunities for cyber threats.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statement is FALSE? Tick your answer.

Phishing is a method used by cybercriminals to trick you into downloading malware only.

You may unintentionally install malware by downloading apps from unofficial sources.

Cybercriminals may use sideloading to distribute malware.

Adware, spyware and trojan horse are types of malware.

4.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the signs of malware infection on your device? Circle the 4 correct signs.

Slowing down of your device

Appearance of unknown apps on your device

Unexpected decrease in storage space in your device

Auto-activation of camera or microphone

Decrease in your device’s data usage

5.

DROPDOWN QUESTION

1 min • 4 pts

These are the 6 tips to spot phishing.

  • 1. Mismatched and

    misleading ​ (a)  

  • 2. Request for ​ (b)  

    information

  • 3. Use of urgent or

    ​ (c)   language

  • 4. Unexpected emails

  • 5. Promises of attractive ​ (d)  

  • 6. Suspicious attachments

information
personal
threatening
rewards

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Apart from being aware of phishing scams, name one other cyber tip that you can practise.
Answer: Add S C _ _ _ S_ _ _ L _ and anti-virus apps.

7.

OPEN ENDED QUESTION

3 mins • 2 pts

Discuss ONE of the reasons behind the inclusion of Digital Defence as the sixth pillar in Total Defence.

Evaluate responses using AI:

OFF

8.

VIDEO RESPONSE QUESTION

10 mins • 5 pts

Record a short We-fie video of you at the pop-up vending booth OR the photo booth the PSL has set up.

10 sec video