ICT digital security risk

ICT digital security risk

8th Grade

7 Qs

quiz-placeholder

Similar activities

7.02 going online

7.02 going online

4th - 9th Grade

10 Qs

Coding dan Kecerdasan Artifisial/AI

Coding dan Kecerdasan Artifisial/AI

1st Grade - University

10 Qs

KEYBOARDING VOCABULARY

KEYBOARDING VOCABULARY

5th - 8th Grade

11 Qs

Cybersecurity - L1 Recap

Cybersecurity - L1 Recap

8th Grade

10 Qs

Gestión de riesgos

Gestión de riesgos

1st - 10th Grade

10 Qs

Internet and Computer Safety Essential Terms

Internet and Computer Safety Essential Terms

6th - 8th Grade

10 Qs

POCS-Ch1.3 (Vocab)

POCS-Ch1.3 (Vocab)

6th - 8th Grade

10 Qs

Malware

Malware

7th - 11th Grade

9 Qs

ICT digital security risk

ICT digital security risk

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Amna Almansoori

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a digital security risk?

Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability

its when someone sabotages your mobile device

When a hacker places a virus into your computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define hacker

Someone who illegally accesses the network without any technical skills and knowledge

Someone who accesses a computer or a network illegally but has the intent of improving security

Someone who works very well with the computers and networking skills

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A corporate spy is someone who has excellent computer and networking skills.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cracker is someone who breaks into his employer’ computers for revenge.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define Cyber Extortionist

Someone who has the intent of hacking into an organization’s security for financial gains.

Someone who plays games on a computer.

Someone who demands to stop an attack on an organization’s technology infrastructure.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An _____ Has the intent of breaking into his employer’s computer for exploiting a security weakness.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _____ is planning on hacking into a computer network illegally for a heist.