cybersecurity worksheet

cybersecurity worksheet

9th Grade

29 Qs

quiz-placeholder

Similar activities

PEMROGRAMAN DASAR

PEMROGRAMAN DASAR

10th Grade

25 Qs

Introducción Tecnología de la Información III

Introducción Tecnología de la Información III

11th Grade

25 Qs

ITS301-Unit1 OHS Trial Test 2

ITS301-Unit1 OHS Trial Test 2

University

25 Qs

BTEC Coding & Logic

BTEC Coding & Logic

12th Grade - Professional Development

24 Qs

Year 11 Computing

Year 11 Computing

11th Grade

24 Qs

Lesson 8-15

Lesson 8-15

9th - 12th Grade

24 Qs

Salaries and Payslips Quiz

Salaries and Payslips Quiz

12th Grade - University

24 Qs

0417 - qn's

0417 - qn's

10th Grade

24 Qs

cybersecurity worksheet

cybersecurity worksheet

Assessment

Quiz

Computers

9th Grade

Practice Problem

Medium

Created by

kollin vos

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

15 mins • 5 pts

click on this link to access the caesar wheel to decrypt https://www.101computing.net/cipher-wheel.html

You must solve this math problem to obtain the key 4x + 12 = 3x -2

decrypt this phrase once you've obtained the key

vf ndawg yk odmkaze

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malicious software that threatens to publish the victim's information or block access to it unless a fee is paid is called ____.

ransomware

cryptoware

spyware

trojan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is an umbrella term that describes all forms of malicious software designed to wreak havoc on a computer such as viruses, trojans, worms, and ransomware.

malware

spyware

morphware

mountware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A piece of malware included within another program that often allows a hacker to gain remote access to a computer is called a/an _____.

trojan horse

ransomware

virus

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cipher where each letter represents a different letter is called a ________ cipher.

substitution

static

polyalphabetic

monolithic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the oldest and simplest forms of encrypting a message is a substitution cipher known as ________.

Caesar

Two-Square

Beaufort

Running Key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When creating a secret message, the use of a cipher to create that message is called ________.

cryptography

steganography

cartography

stenography

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?