
Cybersecurity 101
Authored by Hilary Bertsch
Education
9th - 12th Grade
Used 57+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a network?
An internet service provider
A super computer
Interconnected computers or devices
A group of programers
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why are cyber vulnerabilities unlikely to ever go away?
They are the side effects of freedom and ease of communication.
Criminals need them to steal identities.
The government won't allow people to fix them.
They're protected in a secret base on the moon.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these groups exploit cyber vulnerabilities?
Criminals
Governments
Hacktivists
All of these
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What did the identity-theft crime ring use Tim's photo for?
To create a Tim-like disguise
To make a couerfeit password
To figure out Tim's address
They sent is in spam emails to Tim's friends
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
How to maintain your privacy?
Never get on a computer.
Avoid social media.
Avoid electronic gadgets.
Don't use credit cards.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why do hackers hack?
To make discoveries
To protect information and/or expose corruption
To steal information and money
All of the choices
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is not a hack?
Stealing an unlocked bicycle
Building an unlocked bicycle out of a discarded umbrella
Using a bicycle to power a computer
Creating a kinetic bicycle sculpture
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?