cybersecurity Do now week2

cybersecurity Do now week2

12th Grade

7 Qs

quiz-placeholder

Similar activities

SIEM and Log Management Quiz

SIEM and Log Management Quiz

9th - 12th Grade

8 Qs

E-Safety

E-Safety

6th - 12th Grade

5 Qs

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

Swinburne Sarawak

Swinburne Sarawak

1st Grade - University

10 Qs

Incident Response Policy 2

Incident Response Policy 2

12th Grade

10 Qs

Cybersecurity

Cybersecurity

12th Grade

10 Qs

Communication & Networking - Differences Between LAN & WAN

Communication & Networking - Differences Between LAN & WAN

2nd - 12th Grade

10 Qs

Computer Hardware - Purpose & Function of CPU

Computer Hardware - Purpose & Function of CPU

5th - 12th Grade

10 Qs

cybersecurity Do now week2

cybersecurity Do now week2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Mai Barakat

Used 6+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is cybersecurity

the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, and damage.

the smart devices

social media

the hackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

true or false?
phishing is one type of cybersecurity?

true

false

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

true or false?
smart phone is type of cyber attacks?

true

false

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three basic principles of cybersecurity are :

trust, integrity, and availability

confidentiality, integrity, and availability

reality and availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:
Phishing attacks are attempts to obtain sensitive information such as passwords, credit card details, or personal data.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:

Malware is a type of software designed to damage, disrupt, or steal information from a computer system

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


.................. are tactics used to trick individuals into revealing sensitive information or performing actions that can harm a system or organization.

phishing

Social engineering attacks

Malware