Search Header Logo

Introduction to Cyber Security Exam

Authored by Joseph Carpenter

Computers

9th - 12th Grade

Used 3+ times

Introduction to Cyber Security Exam
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of personal information do people send over the Internet?

All of the above

Medical Information

Contact Information

Credit Card Numbers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Learning computer science or coding is only useful if you want to become a professional programmer.

FALSE

TRUE

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not true about cybersecurity?

Recent data breaches have released personal information of hundreds of millions of people.

Cybersecurity is the protection of computer systems, networks, and data from digital attacks.

As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks.

  1. Cyber attacks can devastate large organizations, but individuals are largely unaffected.

Answered

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices is not connected to the Internet of Things?

A digital baby monitor that allows you to stream video and audio of your nursery from the Internet

A wearable device that measures your physical activity and allows you to track your activity through a mobile app

A smart thermostat that allows you to remotely control your home’s temperature through a mobile app

An AM/FM radio without any bluetooth or Internet connection capabilities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about the Internet of Things?
I. The Internet of Things is the network of devices with the ability to connect and exchange data.
II. The Internet of Things increases our vulnerability to cyber attacks.
III. The Internet of Things is purely positive–there are no negative consequences to increased connectivity

None of the above

I and III

I only

I and II

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Identity theft, stealing money, stealing private information, controlling private computers.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

is a type cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?