
Cybersecurity
Authored by Wayground Content
Computers, Instructional Technology
7th Grade
Used 30+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious file that can attach to other files and replicate when the user shares the file.
Virus
Worm
Trojan
DDOS
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a computer hacker?
A virus that invades your computer and causes it to not work
A person who sends lots of e-mails to people asking for money
A person who uses a computer to illegally breaks into your computer and take your information
A person who cuts or hacks at something
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Look at the password then decide if the password is weak or strong.
anna99
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A strong password shouldn't contain :
Capital and small letters
Common marks /? ().......
Numbers
personal data
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is an example of a strong password?
Mr.Hillegonds
dugitalyrunninglolwhynot
Pa55word
pleasedonthack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of authentication?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is encryption?
A person who tricks you into giving your password
converting information or data into a code to prevent unauthorized access.
To upload your personal data to the cloud
When there is a security breach in your data
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?