Search Header Logo

Cybersecurity

Authored by Maria Morrell

Instructional Technology

10th - 12th Grade

Used 516+ times

Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A strong password shouldn't contain :

Capital and small letters

Common marks /? ().......

Numbers

personal data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form is for Biometrics

It is a known and registered physical attribute of a user specifically used for verifying their identity

is used for accessing systems. It makes it more difficult for hackers to access accounts as they have long credentials

It’s a security system that needs more than one method of authentication

A one-time pin or password is used in processing online transactions through which they verify their identity

This authentication needs two different signals from two different channels or networks. It prevents most of the attacks from hacking and identity thefts in online banking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following practices can prevent phishing, one of them can't? What is it?

Use firewalls on your networks and systems

Maintain adequate security

Build a denial of service response plan

Use two-factor authentication wherever possible

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are cyber vulnerabilities unlikely to ever go away?

The government won't allow people to fix them.

Criminals need them ti steal identities.

They are side effects of the freedom and ease of communicating online.

They're protected in a secret base on the moon.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do hackers hack?

To make discoveries

To protect information

To steal information and money

To expose corruption

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is regularly used to secure online communication?

Caesar cipher

Public-key encryption

Morse code

Enigma code

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you tell if a website encrypts its traffic?

Google it

Look for a lock symbol in a URL

All websites encrypt their traffic

Encrypted sites take longer to load

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?