Cyberthreats Case Study and Ethics Wall

Cyberthreats Case Study and Ethics Wall

10th Grade

9 Qs

quiz-placeholder

Similar activities

Virtualization Concepts and Differences

Virtualization Concepts and Differences

9th - 12th Grade

11 Qs

CK Cyber 2 - LO1.1.A

CK Cyber 2 - LO1.1.A

10th Grade

10 Qs

Information Technology Quiz

Information Technology Quiz

10th Grade

14 Qs

Identifying Cybersecurity Threats

Identifying Cybersecurity Threats

10th Grade

10 Qs

Soal Menyaring Profesi di bidang informatika

Soal Menyaring Profesi di bidang informatika

10th Grade - University

10 Qs

CK Cyber 2 - LO1.3.D

CK Cyber 2 - LO1.3.D

10th Grade

10 Qs

SSC Summer Camp Pre-Quiz

SSC Summer Camp Pre-Quiz

9th - 12th Grade

10 Qs

CY4U2 Compliance Pretest

CY4U2 Compliance Pretest

9th - 12th Grade

10 Qs

Cyberthreats Case Study and Ethics Wall

Cyberthreats Case Study and Ethics Wall

Assessment

Quiz

Information Technology (IT)

10th Grade

Hard

Created by

Zoey Copeland

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What human mistake caused the Chatter company’s cybersecurity incident?

  • Using unlicensed software

  • Opening a suspicious email

  • Leaving a laptop on public transport

  • Downloading malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which PwC cyber team simulates attacks and prepares companies for major threats?

  • Ethical Hackers

  • Identity Access Team

  • Core Advisory

  • Crisis Team

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What regulation requires businesses to report breaches and protect personal data?

  • ISO 27001

  • GDPR

  • FOIA

  • HIPAA

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which countries were allegedly involved in creating Stuxnet?

  • USA and Israel

  • North Korea and Iran

  • UK and France

  • China and Russia

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What made the Stuxnet cyber attack so sophisticated?

  • It used brute force

  • It was delivered via phishing

  • It targeted industrial systems and hid its presence

  • It spread through social media

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyber threat was used in the healthcare facility case from the video?

  • Spyware

  • Phishing

  • Ransomware

  • Social Engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key reason attackers were successful in many real-world cyber attacks?

  • Companies used open-source software

  • Employees were unaware of basic cybersecurity practices

  • Systems were too old to upgrade

  • Firewalls were too strong

8.

OPEN ENDED QUESTION

3 mins • 1 pt

What lessons can we learn from real-world cyber attacks about protecting people and systems?

Evaluate responses using AI:

OFF

9.

OPEN ENDED QUESTION

3 mins • 1 pt

How can a company like Chatter improve its cybersecurity culture?

Evaluate responses using AI:

OFF