Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

quiz-placeholder

Similar activities

Cloud computing

Cloud computing

Professional Development

10 Qs

Be4PSPM 1

Be4PSPM 1

1st - 5th Grade

10 Qs

JAVA IDENTIFIERS

JAVA IDENTIFIERS

6th - 8th Grade

14 Qs

Debugging Challenge 2

Debugging Challenge 2

7th - 12th Grade

15 Qs

CIO Acade&my III_ M&A  Tech Advisory Quiz

CIO Acade&my III_ M&A Tech Advisory Quiz

Professional Development

10 Qs

Printers

Printers

9th - 12th Grade

10 Qs

Cycle 4: Session 8 Review.

Cycle 4: Session 8 Review.

Professional Development

12 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Understanding Cybersecurity

Understanding Cybersecurity

Assessment

Quiz

Computers

5th Grade - Professional Development

Practice Problem

Hard

Created by

Fleur-de-lis Nadua

Used 127+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is one way hackers use to acquire your password?

Two Factor Authentication (2FA)

Thesaurus

Brute force

key blogger

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It is a form of cyber attack that attempts to make the user give up their sensitive information by disguising as a legitimate person or entity thru e-mail, messaging app, or telephone.

Man-in-the-Middle Attack

brute force

malware attack

phishing

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

One of the biggest cyber heist in history where 81M USD was transferred to a Philippine bank.

Bangladesh Bank heist

South Korea Bank Heist

AMEX Bank Heist

India Central Bank heist

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Lack of awareness and ____ make the perfect set up for a successful cyber attack or cybercrime.

panicking

lack of awareness

rushing

lack of technology

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This is the psychological manipulation of people into performing actions or divulging confidential information.

social engineering

man-in-the-middle attack

social disclosure

eavesdropping attack

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A cyber attack in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the data is decrypted and access returned to the victim.

DDoS Attack

kidnap for ransom

ransomware

data hack

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Aside from PNP Anti-Cybercrime Group, what is the other law enforcement agency mandated to handle cybercrime cases?

CICC

DICT

DOJ Office of Cybercrime

NBI Cybercrime Division

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?