Cyber Security Basics

Cyber Security Basics

8th Grade

20 Qs

quiz-placeholder

Similar activities

ICT REVIEW

ICT REVIEW

6th - 8th Grade

18 Qs

SOCIAL ENGINEERING

SOCIAL ENGINEERING

8th Grade

16 Qs

Revision sheets for November

Revision sheets for November

8th Grade

15 Qs

Cybersecurity 101

Cybersecurity 101

6th - 8th Grade

20 Qs

POCS-CH1.2 (Vocab)

POCS-CH1.2 (Vocab)

6th - 8th Grade

20 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

DHS 2019-2020 Mid team quiz #3

DHS 2019-2020 Mid team quiz #3

7th - 12th Grade

15 Qs

Cyber Security Basics

Cyber Security Basics

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Tracy Mutter

Used 3+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe individuals who gain unauthorized access to computer systems for malicious purposes?

spammers

crackers

phishers

hackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for individuals who use their hacking skills for good, such as testing the security of systems?

White hat hackers

Positive hackers

Ethical hackers

Moral hackers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker is known for exploiting computer systems for personal gain or malicious intent?

Black hat hacker

Rainbow hat hacker

White hat hacker

Grey hat hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for hackers who fall between ethical and black hat hackers, sometimes using their skills for good and other times for malicious purposes?

Grey hat hackers

White hat hackers

Red hat hackers

Blue hat hackers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication?

Vishing

Spoofing

Smishing

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a security mechanism set to detect, deflect, or counteract attempts at unauthorized use of information systems?

Firewall System

Malware Protection

Data Encryption

Intrusion Detection System (IDS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which legislation in the UK makes it illegal to gain unauthorized access to computer systems?

Digital Privacy Law 2012

Computer Misuse Act 1990

Cybersecurity Regulation 2005

Computer Access Act 1995

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?