Cybersecurity Part 1

Cybersecurity Part 1

8th Grade

7 Qs

quiz-placeholder

Similar activities

Security online acts

Security online acts

7th - 9th Grade

10 Qs

Phishing Quiz

Phishing Quiz

8th Grade

6 Qs

Don`t Feed the Phish

Don`t Feed the Phish

6th - 8th Grade

10 Qs

Ergonomics

Ergonomics

8th - 10th Grade

10 Qs

Video games

Video games

8th Grade - Professional Development

8 Qs

IC3 GS6 Level 1 Domain 5 Assessment

IC3 GS6 Level 1 Domain 5 Assessment

6th - 12th Grade

10 Qs

Vocabulário - Informática

Vocabulário - Informática

8th Grade

11 Qs

Tesla vs. Edison

Tesla vs. Edison

4th - 12th Grade

12 Qs

Cybersecurity Part 1

Cybersecurity Part 1

Assessment

Quiz

Instructional Technology

8th Grade

Easy

Created by

Laurie Colter

Used 3+ times

FREE Resource

7 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

When was Cybersecurity not an issue?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

When did Cybersecurity become a big concern?

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

How many threatening pieces of malware are currently circulating the world?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do people commit computer crimes?

Financial Gain

To show off hacking skills

They enjoy chaos

coerced by organized crime

all of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3 reasons why cybersecurity is important

stop financial theft

keep government and military information safe

to keep people safe from identity theft

all of the above

6.

MATCH QUESTION

1 min • 1 pt

Match the following

obtaining something by using force

extortion

attacker gains access to computers

sensitive

private info that must be kept secure

breach

scramble data so can't be read

intent

purpose

encryption

7.

MATCH QUESTION

1 min • 1 pt

Match the following

hospitals

government

education

vulnerability

advanced, original, creative thinking

innovative

lose money

lose data

stress and anxiety

3 things hackers want to steal

identities

credit card

computer systems

3 industries hackers target

the possibility of being attacked

effects after being hacked