Year 9 - Cybersecurity

Year 9 - Cybersecurity

6th - 8th Grade

15 Qs

quiz-placeholder

Similar activities

Network Topologies & Malware

Network Topologies & Malware

6th - 12th Grade

17 Qs

Internet Safety and Cyber Security - 1

Internet Safety and Cyber Security - 1

8th Grade

16 Qs

Software - Common Utility Programs

Software - Common Utility Programs

3rd - 12th Grade

10 Qs

Y9 Cyber Security Homework

Y9 Cyber Security Homework

8th Grade

20 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Networks Recap Quiz

Networks Recap Quiz

8th Grade

19 Qs

Network security

Network security

8th - 9th Grade

10 Qs

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

Year 9 - Cybersecurity

Year 9 - Cybersecurity

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

O Moore

Used 234+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which UK law gives you the right to access the data an organisation stores on you?

The Freedom of Information Act

The Computer Misuse Act

The Data Protection Act

The Copyright, Designs, and Patents Act

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When data has been processed and is meaningful, which of these has it become?

Information

Processed data

Identifiable data

Profiled

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Data Protection Act?

To protect an organisation from hackers

To require organisations that store data on people to use it responsibility and keep it safe

To act as a deterrent to cybercriminals who try to steal data on people

To prevent cybercriminals from spreading a virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering?

Methods used by cybercriminals to deceive individuals into handing over information

Hacking a system by taking control of someone else's computer

Using the computer of someone who has accidently left themselves logged on

A malicious attempt to disrupt a server or network by flooding it with internet traffic

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

Shouldering

Phishing

Spam

Blagging

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a name generator attack?

Software used to randomly create accounts that post to social media

Attackers create an online quiz to produce a name; the answers to the quiz find out key pieces of information that can help them to answer the security questions protecting people's accounts

An attack that makes multiple attempts to guess a username and password

A form of identity theft conducted online

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

‘Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?

Hacking

Viruses

Social engineering

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?