Cyber security

Cyber security

12th Grade

10 Qs

quiz-placeholder

Similar activities

Digital Communication II

Digital Communication II

5th Grade - University

15 Qs

Python Generators

Python Generators

10th Grade - University

10 Qs

IT English Essentials: Unit 9 - Quiz 1

IT English Essentials: Unit 9 - Quiz 1

12th Grade

10 Qs

Margaret Hamilton

Margaret Hamilton

4th Grade - University

13 Qs

Introduction to Digital Technology

Introduction to Digital Technology

12th Grade

10 Qs

Cyber Security Short Answer questions

Cyber Security Short Answer questions

9th - 12th Grade

14 Qs

Unit 5

Unit 5

9th - 12th Grade

15 Qs

Mobile Security

Mobile Security

9th - 12th Grade

14 Qs

Cyber security

Cyber security

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Victoria Price

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes

Society engineering

Social endangering

Social engineering

Social escaping

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is different about social engineering, in comparison to other cybercrimes?

Machines tricking machines

Humans tricking humans

Humans tricking machines

Machines tricking humans

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call an attack that involves the attacker watching the victim while they provide sensitive information?

Shoulder somersaulting

Shoulder suggesting

Shoulder singing

Shoulder surfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call attacks in which the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name?

Name generator

Word generator

Guess generator

People generator

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the name of an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data?


Praying

Phishing

Wishing

Singing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do we call an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money?

Blinking

Blasting

Blogging

Blagging

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Greatest F1 driver of all time

Lewis Hamilton

Lewis Hamilton

Lewis Hamilton

Lewis Hamilton

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?