cybersecurity worksheet

cybersecurity worksheet

9th Grade

29 Qs

quiz-placeholder

Similar activities

informatika, Algoritma dan pemrograman

informatika, Algoritma dan pemrograman

11th Grade

25 Qs

Teori Produktif TKJ

Teori Produktif TKJ

12th Grade - University

25 Qs

SAINS KOMPUTER

SAINS KOMPUTER

4th - 12th Grade

30 Qs

Networks, Internet Communication and Protocols

Networks, Internet Communication and Protocols

9th Grade

25 Qs

Pemrograman Web - UNIB

Pemrograman Web - UNIB

University

25 Qs

Macromedia Flash

Macromedia Flash

8th Grade - Professional Development

26 Qs

ULANGAN HARIAN 2D

ULANGAN HARIAN 2D

11th Grade

25 Qs

cybersecurity worksheet

cybersecurity worksheet

Assessment

Quiz

Computers

9th Grade

Medium

Created by

kollin vos

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

15 mins • 5 pts

click on this link to access the caesar wheel to decrypt https://www.101computing.net/cipher-wheel.html

You must solve this math problem to obtain the key 4x + 12 = 3x -2

decrypt this phrase once you've obtained the key

vf ndawg yk odmkaze

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malicious software that threatens to publish the victim's information or block access to it unless a fee is paid is called ____.

ransomware

cryptoware

spyware

trojan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is an umbrella term that describes all forms of malicious software designed to wreak havoc on a computer such as viruses, trojans, worms, and ransomware.

malware

spyware

morphware

mountware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A piece of malware included within another program that often allows a hacker to gain remote access to a computer is called a/an _____.

trojan horse

ransomware

virus

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cipher where each letter represents a different letter is called a ________ cipher.

substitution

static

polyalphabetic

monolithic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the oldest and simplest forms of encrypting a message is a substitution cipher known as ________.

Caesar

Two-Square

Beaufort

Running Key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When creating a secret message, the use of a cipher to create that message is called ________.

cryptography

steganography

cartography

stenography

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?