Cybersecurity Awareness Quiz PART 1

Cybersecurity Awareness Quiz PART 1

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

IGCSE ICT Software and Hardware

IGCSE ICT Software and Hardware

6th - 8th Grade

13 Qs

Sistem Komputer (Perangkat Lunak)

Sistem Komputer (Perangkat Lunak)

7th Grade

11 Qs

Quiz on Iterative Development in Python Programming

Quiz on Iterative Development in Python Programming

8th Grade

14 Qs

Lesson 1 Software

Lesson 1 Software

7th Grade

15 Qs

3RD TERM 2ND C.A.T (I.C.T) YR5

3RD TERM 2ND C.A.T (I.C.T) YR5

5th Grade - University

10 Qs

Introduction to Computer Science Concepts

Introduction to Computer Science Concepts

6th Grade - University

10 Qs

CT7-Group Quiz

CT7-Group Quiz

7th Grade

15 Qs

Cybersecurity Awareness Quiz PART 1

Cybersecurity Awareness Quiz PART 1

Assessment

Quiz

Information Technology (IT)

6th - 8th Grade

Medium

Created by

NADJHLA MURAT GRACIA

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sharon discovered that someone accessed her social media account. They posted several mean posts and comments on her friend’s posts. Then she discovered that someone got into her computer and sent emails to her friends as well. Later Sharon discovered it was her brother who did this. What was likely the problem?

Sharon did not update her operating system when the updates came out.

Sharon did not have her firewall turned on her computer.

Sharon used the name of their pet as her password for all her accounts.

Sharon used multifactor authentication on her social media accounts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Abe does tax returns for customers in the evening. One night the numbers for one of his clients were incorrect. His youngest daughter innocently said she opened some files and pushed buttons. What part of the CIA triad was violated when the data was changed?

Confidentiality

Availability

Privacy

Integrity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Elijah’s computer froze while he was working on his school report. Earlier he had clicked on an attachment that someone had sent him. He restarted his computer and five minutes later the same thing happened again. What type of malware did the attachment likely contain?

Worm

Adware

Spyware

Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The manufacturer of an operating system (OS) sent out an urgent update. The update would fix a security problem that allowed hackers to secretly access a device through the OS. Once in, the hackers could install harmful malware. What type of threat is this?

Spyware

Trojan

Adware

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maria got a new notebook computer for college. She did not install the antivirus software because it was expensive. At the college library she was talking with friends on chat software. A friend sent everyone a funny image they took. Maria did not click on it. What was the likely reason for this?

Maria was getting too distracted by her friends and needed to focus on her homework.

Maria was concerned that the image would be violating a copyright infringement.

Maria did not have software installed to protect her computer from malware.

Maria did not have her firewall configured on her new computer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma is trying to use a strong and different password for each of her accounts. However, she keeps forgetting them and has to reset passwords often. What can Emma do to resolve this issue?

Use a password manager.

Use two-factor authentication.

Use antivirus software.

Use ransomware software.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mateo left his smartphone on his desk when he quickly went to the drinking fountain. When he came back, he saw his friends with his phone. They were modifying his phone settings. What should Mateo do to ensure others can’t get to his smartphone apps and settings?

Download an app that sets off a funny noise if someone touches his phone.

Use a personal identification number to lock his screen.

Install a firewall on his smartphone to protect his apps and settings.

Ensure antivirus software is installed on the phone to protect it.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?