Cyber threats

Cyber threats

8th Grade

7 Qs

quiz-placeholder

Similar activities

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

8th - 10th Grade

10 Qs

Social Engineering

Social Engineering

8th Grade

9 Qs

Cybersecurity and Crime

Cybersecurity and Crime

6th - 8th Grade

9 Qs

societal impacts class12

societal impacts class12

KG - 12th Grade

10 Qs

M1 L2 Cyber Security

M1 L2 Cyber Security

7th - 8th Grade

10 Qs

Common Sense Cybersecurity

Common Sense Cybersecurity

8th Grade

9 Qs

Cybersecurity Basics 1.3

Cybersecurity Basics 1.3

7th - 9th Grade

6 Qs

Cyber security quizlet

Cyber security quizlet

8th - 9th Grade

10 Qs

Cyber threats

Cyber threats

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Zaheer Abbas

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is cyber security?

The use of techniques or skills to protect data networks and systems from attack

The use of technology to send messages and communicate with others

The study of computer programming and software development

The process of designing and creating eye-catching images

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Why is there a shortage of cyber security experts?

There are too many hackers and not enough experts to fight them

The internet is constantly changing and it's hard to keep up with new threats

Cyber security is not a popular career choice

Companies are not willing to invest in cyber security

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the role of a social engineering trainer in cyber security?

Designing posters and creating eye-catching images to teach people about security

Monitoring computer networks and detecting hackers

Teaching people how to spot scams and phishing attempts

Testing targeted systems to see if they can be hacked

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the role of a network security admin in cyber security?

Designing posters and creating eye-catching images to teach people about security

Monitoring computer networks and detecting hackers

Teaching people how to spot scams and phishing attempts

Testing targeted systems to see if they can be hacked

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Sending emails in an attempt to gain money or information from people due to a made up reason

Blagging

Phishing

Social Engineering

Virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You get a phone call from someone pretending to be from microsoft, they ask for your log in details and password

Phishing

Blagging

Brute Force

Hacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What always needs to be turned in to ensure your computer is safe?
Firewall
The Winter Wall
Lightningwall
Waterwall