Unit 8 Review - Cybersecurity & Global Impacts

Unit 8 Review - Cybersecurity & Global Impacts

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Unit 6 Quiz - Bootstrap: Algebra

Unit 6 Quiz - Bootstrap: Algebra

6th - 12th Grade

11 Qs

Correlation Properties

Correlation Properties

9th - 12th Grade

10 Qs

Identifying Like Terms

Identifying Like Terms

7th - 10th Grade

10 Qs

True or False Equations

True or False Equations

9th Grade

13 Qs

Quadrilaterals - Class 9

Quadrilaterals - Class 9

9th Grade

13 Qs

Cryptography

Cryptography

8th - 12th Grade

5 Qs

Solving Systems of Equations

Solving Systems of Equations

8th - 9th Grade

10 Qs

متوازي الأضلاع

متوازي الأضلاع

8th - 9th Grade

10 Qs

Unit 8 Review - Cybersecurity & Global Impacts

Unit 8 Review - Cybersecurity & Global Impacts

Assessment

Quiz

Mathematics

9th - 12th Grade

Easy

Created by

Kerri-Ann Bacci

Used 9+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common cybersecurity threat?

Phishing

Keylogging

Encryption

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE/FALSE: A privacy policy is a legal document that protects companies by outlining how they use "user" data.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption uses two keys, one for encryption and a different one for decryption?

Caesar's Cipher

Symmetric Key Encryption

Public Key Encryption

Simple Substitution Cipher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary benefit of using MFA (multi-factor authentication)?

It speeds up the login process.

It completely eliminates the risk of hacking.

It adds an extra layer of security, making it harder for unauthorized users to gain access.

It simplifies password management.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of decoding an encrypted message called ?

Encryption

Hacking

Decryption

Ciphering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE/FALSE: Updating the software on your devices is not considered a good security practice.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user connects to a Wi-Fi network that appears to be from their company, but it was not installed by the IT department. This is most likely an example of:

A virtual private network (VPN)

A legitimate public Wi-Fi hotspot

A rogue access point

A firewall

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE/FALSE: Keylogging software records a user's keystrokes, potentially capturing sensitive information like passwords.

True

False