
Understanding Cybersecurity Threats and Protections

Interactive Video
•
Computers
•
7th - 12th Grade
•
Hard

Lucas Foster
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of attack covered in the video?
Social Engineering
Data Interception
Brute Force Attacks
Malware Injection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of social engineering?
To damage software
To steal hardware
To deceive someone into revealing confidential information
To intercept data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the phishing email example, what was the fake email pretending to be from?
Amazon
Spotify
Netflix
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended method to avoid falling for phishing emails?
Click on all links in emails
Use a strong password
Search for the company on Google and click the top link
Disable your firewall
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of a firewall in protecting against phishing?
To encrypt data
To filter out illegitimate websites
To store passwords securely
To guess passwords
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is data interception?
Listening in on data being sent to or from a computer
Guessing passwords
Sending phishing emails
Installing malware
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can data interception be countered?
Encrypting the data
Using strong passwords
Disabling the firewall
Clicking on email links
Create a free account and access millions of resources
Similar Resources on Wayground
8 questions
Browser Security Features and Protections

Interactive video
•
7th - 12th Grade
6 questions
Understanding Brute Force Attacks

Interactive video
•
6th - 10th Grade
11 questions
Understanding Phishing Attacks

Interactive video
•
7th - 12th Grade
11 questions
Understanding Password Security and Attacks

Interactive video
•
9th - 12th Grade
8 questions
Secure Online Banking

Interactive video
•
KG - 12th Grade
8 questions
Understanding Man-in-the-Middle Attacks

Interactive video
•
9th - 12th Grade
6 questions
PHISH: Practicing Good Email and Sign-in Hygiene

Interactive video
•
KG - University
11 questions
Cybersecurity Concepts and Threats

Interactive video
•
7th - 12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
Discover more resources for Computers
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
6 questions
RL.10.1 Cite Evidence

Quiz
•
10th Grade