
2. Cybersecurity Awareness(AIE)
Authored by Roger Thompson
Computers
11th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
36 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine Nora has developed a bot to automate her social media tasks. In the context of cyber security, what is this bot?
A software application that runs automated tasks over the internet.
A physical robot that is used for hacking.
A security program designed to protect networks.
A type of malware that damages computer files.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of a botnet used in a scenario where Grace and Benjamin discover their company's network is under attack?
To perform large-scale network attacks.
To protect a network from malware.
To automate the marketing process.
To provide customer service through chatbots.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of an employee action that can cause a vulnerability?
Installing a firewall.
Using strong passwords.
Clicking on a phishing link.
Regularly updating software.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Luna received an email from what appeared to be her bank, asking her to update her password immediately. What is this an example of?
A type of sport.
A method used by hackers to gain unauthorized access to data.
A firewall feature.
A secure way of sending emails.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine Abigail receives a text message that appears to be from her bank, asking her to verify her account details. This scenario is an example of what?
Sending malicious software through SMS.
Fishing for sensitive information in corporate databases.
Smoothing out network vulnerabilities.
Sending legitimate-looking emails to obtain personal information.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can bots and botnets be used in cybercrime to impact companies like those Benjamin, Noah, and Aria work for?
By automating customer service.
By performing distributed denial-of-service (DDoS) attacks on their network infrastructure.
By enhancing network security.
By providing entertainment through online games.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine Nora has received an email asking for her password to update her security settings. What is the best way for her to protect against phishing attacks in this scenario?
Use simple passwords.
Share passwords with colleagues.
Regularly update software and security systems.
Open all email attachments to verify contents.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?