Cybersecurity threats 1

Cybersecurity threats 1

9th Grade

10 Qs

quiz-placeholder

Similar activities

Types of Social Engineering

Types of Social Engineering

9th - 11th Grade

8 Qs

Y9 Hwk Quiz 1 (Social Engineering)

Y9 Hwk Quiz 1 (Social Engineering)

9th Grade

15 Qs

Lesson 10 - Threats to Data

Lesson 10 - Threats to Data

9th Grade

14 Qs

Mobile Security

Mobile Security

9th - 12th Grade

14 Qs

Social Engineering - CyberSecurity

Social Engineering - CyberSecurity

9th - 12th Grade

8 Qs

Year 9 Unit 1 Cybersecurity

Year 9 Unit 1 Cybersecurity

9th Grade

11 Qs

Lesson 1: You and your data

Lesson 1: You and your data

9th Grade

6 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Cybersecurity threats 1

Cybersecurity threats 1

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Phương Nguyễn

Used 24+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web.

cybersecurity

cybercriminals

privacy policies

Social engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes

cybersecurity

cybercriminals

privacy policies

Social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

individuals who use computers, networks, and the internet to perpetrate crime

cybersecurity

cybercriminals

privacy policies

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Statements about how a company will use and protect a consumer's private data.

cybersecurity

cybercriminals

privacy policies

Social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

attacks in which the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.

phishing

blagging

shouldering

name generator attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail

phishing

blagging

shouldering

name generator attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Observing a person's private information over their shoulder e.g. cashpoint pin number

phishing

blagging

shouldering

name generator attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?