
Effective Supervisory Practices p202-205
Authored by Joshua Thompson
Others
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Ransomware?
A) A type of phishing attack
B) A type of malicious software that demands money by blocking access to data or networks
C) A legitimate software used for data recovery
D) A type of email scam
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing is defined as:
A method of cooking fish
A type of cyber attack
A form of physical exercise
A style of painting
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Vishing?
A) A type of malware
B) The phone version of phishing
C) A legitimate phone call
D) A type of virus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware is a type of ___.
software designed to protect systems
software designed to harm or exploit systems
hardware component
network protocol
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Virus in terms of cybersecurity?
A harmless computer program
A computer program that self-replicates and spreads to alter, steal, or delete data
A type of phishing attack
A legitimate software update
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
PII is important because it:
helps in identifying individuals and protecting their privacy.
is a type of computer virus.
is a programming language.
is a new social media platform.
7.
OPEN ENDED QUESTION
3 mins • 1 pt
What are some potential consequences of data breaches mentioned in the text?
Evaluate responses using AI:
OFF
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?