
Cyber Security Review 2
Authored by Cami Fissel
Financial Education
9th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the practice of protecting computers, networks, and data from unauthorized access, attacks, or damage?
Cyber security
Identity theft
Ransomware
Sensitive information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term describes personal data that must be kept private, such as Social Security numbers and bank account details?
Cyber security
Sensitive information
Identity theft
Ransomware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term is associated with protecting data from unauthorized access?
Sensitive information
Identity theft
Cyber security
Ransomware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is considered sensitive information?
Public records
Social Security numbers
News articles
Weather reports
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Multi-Factor Authentication require?
A single password for account access.
Two or more verification methods for account access.
A fingerprint scan only.
A username only.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of IoT devices?
Smart home appliances and vehicles.
Traditional desktop computers.
Old-fashioned telephones.
Typewriters.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to a network of devices that communicate over the internet?
Firewalls
Internet of Things (IoT)
Vulnerabilities
Multi-Factor Authentication
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?