cybersecurity vocabulary

cybersecurity vocabulary

5th - 6th Grade

30 Qs

quiz-placeholder

Similar activities

Hacker Rank Test

Hacker Rank Test

6th - 8th Grade

26 Qs

COMPTIA ITF

COMPTIA ITF

1st Grade - Professional Development

29 Qs

internet terms gpaul

internet terms gpaul

6th Grade - University

32 Qs

Sfida dell'ultimo giorno!

Sfida dell'ultimo giorno!

3rd - 5th Grade

28 Qs

ICT P5 1st Term Final Revision(2) Daqahlya 2024

ICT P5 1st Term Final Revision(2) Daqahlya 2024

5th Grade

26 Qs

9.1 - Computer Crime and Cyber Security

9.1 - Computer Crime and Cyber Security

4th - 9th Grade

30 Qs

External threats

External threats

KG - Professional Development

26 Qs

9.3.5 - Retrieval Quiz

9.3.5 - Retrieval Quiz

6th Grade

34 Qs

cybersecurity vocabulary

cybersecurity vocabulary

Assessment

Quiz

Computers

5th - 6th Grade

Medium

CCSS
RL.8.3, RI.4.5, RL.7.2

+9

Standards-aligned

Created by

Justin Tijerina

Used 62+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

This cipher uses a key number that indicate how much the letters shift - also a salad!

computer virus

cryptography

caesar

hal

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Designed to protect computer users against deliberate attacks and theft of information.

computer miss-use act

computer virus

cyber crime

encryption

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A small but dangerous piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet.

firewall

computer virus

hacking

malware

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The art of Code writing or breaking

cybercrime

trojan

virus

cryptography

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Any illegal activities committed through the use of computers and the internet.

cybercrime

worm

virus

social engineering

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The stealing of secrets stored in digital formats or on computers and IT networks.

spim

spyware

trojan

cyber espionage

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use on normal equipment.

encryption

firewall

analysis

hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?