Search Header Logo

Cyber safety

Authored by Eenaya Garg

Other

6th Grade

Used 6+ times

Cyber safety
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

In which year the term hacking was coined

1965-67

1970-80

1980-82

1955-60

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

what should we do if we get a clickjack

Report the incident and avoid interacting with suspicious elements.
Click on all links to see what happens.
Ignore the warning and continue browsing.
Disable your browser's security settings.

3.

FILL IN THE BLANK QUESTION

1 min • 2 pts

_____________is also a type of malware but is mostly used for surveillance.

4.

FILL IN THE BLANK QUESTION

1 min • 2 pts

__________ is the process of identifying someone's or something's identity, making sure that something is true, genuine, or valid.

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A__________ is a method used for the encrypted, electronic stamp of authentication on digital information such as documents, emails, macros, or digital content.

digital signature
authentication token
digital certificate
encrypted password

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

____: A tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples.

Network monitoring tool
Antivirus software

YARA

Data recovery application

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts


Trial and Error method of hacking passwords is called

Keylogging
Social Engineering
Brute Force Attack
Phishing Attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?