Search Header Logo

Cyber Security

Authored by Kevin Bell

Computers

8th Grade

Used 1+ times

Cyber Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?

Converting

Phishing

Hacking

Soldering

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Unsolicited electronic messages, especially advertising is know as?

Spim

Ransomware

Spam

Doxxing

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these is an example of a phishing email?

You have won the lottery! Follow this link to claim.

Your bank account has been hacked. Login in here to protect yourself.

Help! I am stuck in Europe and I need money to travel home.

All of the above!

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Who is the most likely to be fooled by a phishing email?

Media Image
Media Image
Media Image
Media Image
Media Image

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these is NOT a good password?

#LooneyToons23

passw0rd

Ilovecats!95

#Iasw,aA!

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What should never be used in your password?

My name

My address

My birthday

All of the above

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What change would make this password the STRONGEST?

bills

Add "1234" - now "bills1234"

Change the "b" to B - now "Bills"

Add more words - now "billsToWinItAll!"

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?