cybersecurity worksheet

cybersecurity worksheet

9th Grade

29 Qs

quiz-placeholder

Similar activities

UAT 2024 3 ARIF | 3 HIKMAH

UAT 2024 3 ARIF | 3 HIKMAH

9th Grade

30 Qs

AP CSP Unit 8 Cyber Security and Global Impacts

AP CSP Unit 8 Cyber Security and Global Impacts

9th - 12th Grade

33 Qs

Caesar Cipher

Caesar Cipher

9th Grade

25 Qs

Networking Essentials Chapter 6 Review

Networking Essentials Chapter 6 Review

9th Grade - University

25 Qs

Intro to IT Ch 10 Quiz Review

Intro to IT Ch 10 Quiz Review

9th - 12th Grade

34 Qs

IAS QUIZ 9

IAS QUIZ 9

University

25 Qs

IAS QUIZ 11

IAS QUIZ 11

University

25 Qs

IAS 2 Identity and Access Management Q5

IAS 2 Identity and Access Management Q5

University

25 Qs

cybersecurity worksheet

cybersecurity worksheet

Assessment

Quiz

Computers

9th Grade

Medium

Created by

kollin vos

Used 1+ times

FREE Resource

29 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

15 mins • 5 pts

click on this link to access the caesar wheel to decrypt https://www.101computing.net/cipher-wheel.html

You must solve this math problem to obtain the key 4x + 12 = 3x -2

decrypt this phrase once you've obtained the key

vf ndawg yk odmkaze

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malicious software that threatens to publish the victim's information or block access to it unless a fee is paid is called ____.

ransomware

cryptoware

spyware

trojan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is an umbrella term that describes all forms of malicious software designed to wreak havoc on a computer such as viruses, trojans, worms, and ransomware.

malware

spyware

morphware

mountware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A piece of malware included within another program that often allows a hacker to gain remote access to a computer is called a/an _____.

trojan horse

ransomware

virus

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cipher where each letter represents a different letter is called a ________ cipher.

substitution

static

polyalphabetic

monolithic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the oldest and simplest forms of encrypting a message is a substitution cipher known as ________.

Caesar

Two-Square

Beaufort

Running Key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When creating a secret message, the use of a cipher to create that message is called ________.

cryptography

steganography

cartography

stenography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?