Year 9 Unit 1 Cybersecurity

Year 9 Unit 1 Cybersecurity

9th Grade

11 Qs

quiz-placeholder

Similar activities

Data Security

Data Security

9th - 10th Grade

15 Qs

AQA GCSE CS: Cyber Security

AQA GCSE CS: Cyber Security

9th - 11th Grade

7 Qs

Mobile Security

Mobile Security

9th - 12th Grade

14 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

Types of Social Engineering

Types of Social Engineering

9th - 11th Grade

8 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

BTEC Tech Award DIT - Threats to Data

BTEC Tech Award DIT - Threats to Data

9th Grade

10 Qs

Year 9 Unit 1 Cybersecurity

Year 9 Unit 1 Cybersecurity

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Erick Geronimo

Used 4+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Raw facts and figures

Data

Information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information is created when data has been processed and becomes meaningful.

True

False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

As a data subject, you have the right to find out what information the government and other organisations store about you.

True

False

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.

Social engineering

Data protection

Cyberwar

Social manipulation

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attack designed to steal a victim's password or other sensitive data.

Shouldering

Phishing

Blagging

Name generator attack

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

These are attacks in which the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

Shouldering

Name generator attacks

Phishing

Blagging

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attack in which the victim receives an email disguised to look as if it has come from a reputable source in order to trick them into giving up valuable data.

Phishing

Blagging

Shouldering

Name generator attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?