OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

9th Grade

8 Qs

quiz-placeholder

Similar activities

Figurative Language Quiz

Figurative Language Quiz

9th Grade

9 Qs

Going Online- Test 3B-Yr6

Going Online- Test 3B-Yr6

4th Grade - University

10 Qs

NDI #10 - Social Media

NDI #10 - Social Media

9th - 12th Grade

9 Qs

Cartoon Network: Trivia Tuesday

Cartoon Network: Trivia Tuesday

KG - Professional Development

10 Qs

Quiz on Space

Quiz on Space

9th - 12th Grade

8 Qs

Computer Cart Procedures

Computer Cart Procedures

7th - 9th Grade

10 Qs

Guess the Movie (from the Log Line)

Guess the Movie (from the Log Line)

9th - 12th Grade

10 Qs

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

OSS PSL: BE CYBER SAFE POP-UP ACTIVITY SHEET

Assessment

Quiz

Arts

9th Grade

Medium

Created by

Norizan Nor

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

DRAG AND DROP QUESTION

45 sec • 3 pts

What is a Critical Information Infrastructure (CII)?
A ​ (a)   that is ​ (b)   responsible for the ​ (c)   of essential services like water, energy, banking, healthcare or transportation.

directly
delivery
computer

2.

MULTIPLE SELECT QUESTION

1 min • 2 pts

In what ways do Artificial Intelligence (AI) and Internet of Things (IoT) contribute to increased cyber threats? Choose the 2 correct statements.

Many IoT devices lack security features, increasing vulnerability.

AI systems cannot be tricked to make the wrong decisions.

More connections between devices create more opportunities for cyber threats.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statement is FALSE? Tick your answer.

Phishing is a method used by cybercriminals to trick you into downloading malware only.

You may unintentionally install malware by downloading apps from unofficial sources.

Cybercriminals may use sideloading to distribute malware.

Adware, spyware and trojan horse are types of malware.

4.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the signs of malware infection on your device? Circle the 4 correct signs.

Slowing down of your device

Appearance of unknown apps on your device

Unexpected decrease in storage space in your device

Auto-activation of camera or microphone

Decrease in your device’s data usage

5.

DROPDOWN QUESTION

1 min • 4 pts

These are the 6 tips to spot phishing.

  • 1. Mismatched and

    misleading ​ (a)  

  • 2. Request for ​ (b)  

    information

  • 3. Use of urgent or

    ​ (c)   language

  • 4. Unexpected emails

  • 5. Promises of attractive ​ (d)  

  • 6. Suspicious attachments

information
personal
threatening
rewards

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Apart from being aware of phishing scams, name one other cyber tip that you can practise.
Answer: Add S C _ _ _ S_ _ _ L _ and anti-virus apps.

7.

OPEN ENDED QUESTION

3 mins • 2 pts

Discuss ONE of the reasons behind the inclusion of Digital Defence as the sixth pillar in Total Defence.

Evaluate responses using AI:

OFF

8.

VIDEO RESPONSE QUESTION

10 mins • 5 pts

Record a short We-fie video of you at the pop-up vending booth OR the photo booth the PSL has set up.

10 sec video