
Cyber Connections Assessment - 30 min session
Authored by Michelle Luna-Lopez
Computers
10th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cybersecurity, what does CIA stand for?
Confidentiality, Integrity, Availability
Central Intelligence Agency
Cybersecurity Investigation Agency
Cybersecurity, Internet, Accessibility
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the CIA Triad primarily focus on?
Data storage
Information security
Marketing
HR
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why might hackers want control over your identity?
To inform you of weak passwords
To commit crimes or spy on you
To send you personalized ads based on your interest
To become your friend
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a virus in the context of cyber threats?
A) A type of email scam
B) Harmful software that damages a computer's function
C) A protective software
D) A type of hardware malfunction
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does an ethical hacker test?
Software licenses
User interfaces
Websites, apps, and networks
Marketing strategies
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of ethical hacking?
To create new software
To uncover vulnerabilities
To design user-friendly apps
To manage IT projects
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of person might be suited for a career as a Cybersecurity Analyst?
Someone who loves painting
Someone who enjoys solving problems
Someone who prefers outdoor work
Someone who loves science
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?