Unit 7-Cybersecurity

Unit 7-Cybersecurity

9th Grade

12 Qs

quiz-placeholder

Similar activities

NHTW Programming

NHTW Programming

9th Grade

10 Qs

Five Nights At Freddy's: Security Breach Quiz

Five Nights At Freddy's: Security Breach Quiz

KG - Professional Development

13 Qs

Access - Lesson 14

Access - Lesson 14

9th - 12th Grade

10 Qs

BTEC Theory quiz 1: Networks and Internet

BTEC Theory quiz 1: Networks and Internet

8th - 11th Grade

16 Qs

Activity 1: How well do you know Java?

Activity 1: How well do you know Java?

9th Grade

10 Qs

Wee Word Intro

Wee Word Intro

7th - 12th Grade

12 Qs

หน่วยที่ 1 ความรู้พื้นฐานการจัดการ ข้อมูลขนาดใหญ่ (Big Data)

หน่วยที่ 1 ความรู้พื้นฐานการจัดการ ข้อมูลขนาดใหญ่ (Big Data)

9th - 12th Grade

15 Qs

Abhyudaya coding class -  Grade 7

Abhyudaya coding class - Grade 7

6th Grade - University

10 Qs

Unit 7-Cybersecurity

Unit 7-Cybersecurity

Assessment

Quiz

Computers

9th Grade

Practice Problem

Medium

Created by

Celeste Trott

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

The online virtual universe;generally includes a range of services including online games, instant messaging, and the physical devices used to store information.

Cyberspace

Internet

Email

Fortnite

2.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

The building of protection against the threats that lurk in Cyberspace.

Cybersecurity

Space Station X

Space Force

Star Destroyer

3.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

Different types of code (such as computer viruses, worms, or Trojan horses) that harm computers and networks as well as the people and organizations dependent on them.

Cyberattacks

The Darkside

Morris Code

Code of the Elves

4.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

Accessing information in cyberspace without permission; often stealing banking information or holding computer systems hostage for financial gain.

Hacking

Pirating

Espionage

Terrorism

5.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

The belief that governments should be able to control how people and businesses use the internet within their territories.

Cyber Sovereignty

Order of the Jedi

Fortology

Faith of the Seven

6.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

Optical fibers laid on the ocean floor or the bottom of a large body of fresh water that transmits data, power, and other forms of communication.

Submarine Cables

Mermaid's Hair

Electrical Eels

Poseidon's Piano Strings

7.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

The process of monitoring digital devices, computer systems, and network traffic to identify and prevent security threats.

Surveillance

Spyware

Mrs. Trott on Classwize

MI6

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?