Cybersecurity Review

Cybersecurity Review

Assessment

Flashcard

Computers

9th - 12th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

38 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Tatiana is trying to upload her homework submission before the midnight deadline. As she tries to upload the document, the site crashes and she is unable to submit her work by the due date. What concept is being affected? Options: Confidentiality, Integrity, Availability, All of the above

Back

Availability

2.

FLASHCARD QUESTION

Front

Which of the following devices is a part of the Internet of Things? A watch that must be set manually, A security system that only sounds an alarm if the code is not entered correctly, A physical combination padlock for your gym locker, A car with a built-in navigation system

Back

A car with a built-in navigation system

3.

FLASHCARD QUESTION

Front

Which of the following is not true about the Internet of Things?
It is the network of devices with the ability to connect and exchange data,
It increases our vulnerability to cyber attacks,
There are no negative consequences to increased connectivity,
It is growing exponentially

Back

There are no negative consequences to increased connectivity

4.

FLASHCARD QUESTION

Front

Which of the following pieces of information would be safe to include in an online username? School mascot, Favorite Sport, Year of birth, City of residence

Back

Favorite Sport

5.

FLASHCARD QUESTION

Front

Which of the following is not a characteristic of a credible source?
- The author is not named on the website
- The domain is .edu or .gov
- Multiple scholarly sources are cited
- The source is well-organized and follows rules of spelling and grammar

Back

The author is not named on the website

6.

FLASHCARD QUESTION

Front

A type of malware that steals and holds your data hostage until you pay a fee is called ____.

Back

Ransomware

7.

FLASHCARD QUESTION

Front

What should Mariel do upon receiving an urgent email from her bank about her account being deactivated due to suspicious activity? Options: Call her bank or go directly to the bank's website to confirm whether the email is legitimate or not; Assume that the email is a phishing email and delete it; Download the attached file to confirm whether the email is legitimate or not; Click on the link in the email, but be wary of any information that is requested.

Back

Call her bank or go directly to the bank's website to confirm whether the email is legitimate or not.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?