Search Header Logo

ICT Year 9 - Oz Curriculum

Authored by Benjamin Eilenberg

Specialty

9th Grade

ICT Year 9 - Oz Curriculum
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Avery is setting up a new office network. What is the primary purpose of a firewall in network security?

To monitor and control incoming and outgoing network traffic

To store data securely

To encrypt data

To manage user passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma is setting up a new online account and needs to choose a strong password. Which of the following is an example of a strong password?

123456

password

P@ssw0rd!

qwerty

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a class project, Aria received an email that looked like it was from her bank, asking for her login details. What does this scenario refer to in cybersecurity?

A type of malware

An attempt to obtain sensitive information by disguising as a trustworthy entity

A method of encrypting data

A network protocol

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ethan discovered a security vulnerability in his school's computer system. Which of the following actions would be considered unethical behavior in cyber ethics?

Reporting security vulnerabilities

Sharing knowledge about cyber security

Hacking into systems without permission

Using strong passwords

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity class, Evelyn asked, 'What is the main difference between a white hat hacker and a black hat hacker?'

White hat hackers work for the government, black hat hackers do not

White hat hackers use their skills for ethical purposes, black hat hackers use their skills for malicious purposes

White hat hackers are amateurs, black hat hackers are professionals

White hat hackers use encryption, black hat hackers do not

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lily is setting up a wireless network at her home. Which of the following is a common method she can use to secure it?

Using WEP encryption

Disabling the SSID broadcast

Using WPA2 encryption

Enabling guest network access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aiden and Isla are setting up a network for their new startup. What is the role of an Intrusion Detection System (IDS) in network security?

To prevent data breaches

To detect and alert on potential security breaches

To encrypt sensitive data

To manage user access

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?