Search Header Logo

Cybersecurity

Authored by Christopher Truong

Computers, Other, Science

9th - 12th Grade

20 Questions

Used 2+ times

 Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of changing plain text into ciphertext for the purpose of security or privacy?

Denial of Service

Encryption

Endpoint Protection Platform

Digital Signature

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

software that is designed to gain access to your computer with malicious intent. An umbrella term for all software that has malicious intent (viruses, worms, Trojans...)

malware

ransomware

adware

spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that encrypts programs and data until a ransom is paid to remove it.

malware

adware

ransomware

spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

unwanted software that monitors and gathers information on a person and how they use their computer

adware

ransomware

Trojan

spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of a phishing email?

The email contains poor spelling and grammar.

The email is from a government official.

The email is from a trusted source.

The email contains high-quality images.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term 'white hat hacker'?

Illegal hacker – intent on doing harm, stealing for personal gain e.g. taking credit card details.
Doesn’t necessarily steal but may access IT systems without permission which is still illegal.
Ethical hacker – paid by companies to test their systems fro vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by a 'black hat hacker'?

Doesn’t necessarily steal but may access IT systems without permission which is still illegal.
Illegal hacker – intent on doing harm, stealing for personal gain e.g. taking credit card details.
Ethical hacker – paid by companies to test their systems fro vulnerabilities.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?