cyber law

cyber law

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

9th Grade

15 Qs

Studio - U3 - L02.1 Threats to Cyber Security

Studio - U3 - L02.1 Threats to Cyber Security

9th Grade

10 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Cyber Security

Cyber Security

12th Grade

10 Qs

Business Risk

Business Risk

9th Grade

14 Qs

Impact of Security Breaches

Impact of Security Breaches

11th Grade

15 Qs

BLAW 6.03 - 6.02- 6.01 FINAL QUIZ

BLAW 6.03 - 6.02- 6.01 FINAL QUIZ

9th - 12th Grade

15 Qs

cyber law

cyber law

Assessment

Quiz

Computers, Business

9th - 12th Grade

Medium

Created by

taylor grace

Used 94+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Creating a false identity or using someone else's to commit fraud

Cyberpiracy

Cyber proofing

cyber blackmail

cyber germ warfare

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

using a computer to steal digital data

Cyber proofing

Cyberpiracy

Cyber blackmail

cyber germ warfare

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using information obtained by computer to blackmail someone

Cyber proofing

Cyberpiracy

cyber blackmail

Cyber germ warfare

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

transmitting computer viruses to people to destroy their files

cyber proofing

Cyberpiracy

cyber blackmail

Cyber germ warfare

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

using a computer to steal someone's information

Identity theft

phishing

cyber terrorism

cyber vandalism

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

sending emails pretending to be a company to get information from people (like passwords)

identity theft

phishing

cyber terrorism

Cyber vandalism

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

operating a computer to disrupt the national electronic infrastructure

identity theft

phishing

cyber terrorism

cyber vandalism

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?