

Understanding Cybersecurity Threats and Protections
Interactive Video
•
Computers
•
7th - 12th Grade
•
Practice Problem
•
Hard
Lucas Foster
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of attack covered in the video?
Social Engineering
Data Interception
Brute Force Attacks
Malware Injection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of social engineering?
To damage software
To steal hardware
To deceive someone into revealing confidential information
To intercept data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the phishing email example, what was the fake email pretending to be from?
Amazon
Spotify
Netflix
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended method to avoid falling for phishing emails?
Click on all links in emails
Use a strong password
Search for the company on Google and click the top link
Disable your firewall
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of a firewall in protecting against phishing?
To encrypt data
To filter out illegitimate websites
To store passwords securely
To guess passwords
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is data interception?
Listening in on data being sent to or from a computer
Guessing passwords
Sending phishing emails
Installing malware
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can data interception be countered?
Encrypting the data
Using strong passwords
Disabling the firewall
Clicking on email links
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?