
ICT Year 9 - Oz Curriculum
Authored by Benjamin Eilenberg
Specialty
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Avery is setting up a new office network. What is the primary purpose of a firewall in network security?
To monitor and control incoming and outgoing network traffic
To store data securely
To encrypt data
To manage user passwords
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Emma is setting up a new online account and needs to choose a strong password. Which of the following is an example of a strong password?
123456
password
P@ssw0rd!
qwerty
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a class project, Aria received an email that looked like it was from her bank, asking for her login details. What does this scenario refer to in cybersecurity?
A type of malware
An attempt to obtain sensitive information by disguising as a trustworthy entity
A method of encrypting data
A network protocol
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ethan discovered a security vulnerability in his school's computer system. Which of the following actions would be considered unethical behavior in cyber ethics?
Reporting security vulnerabilities
Sharing knowledge about cyber security
Hacking into systems without permission
Using strong passwords
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a cybersecurity class, Evelyn asked, 'What is the main difference between a white hat hacker and a black hat hacker?'
White hat hackers work for the government, black hat hackers do not
White hat hackers use their skills for ethical purposes, black hat hackers use their skills for malicious purposes
White hat hackers are amateurs, black hat hackers are professionals
White hat hackers use encryption, black hat hackers do not
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lily is setting up a wireless network at her home. Which of the following is a common method she can use to secure it?
Using WEP encryption
Disabling the SSID broadcast
Using WPA2 encryption
Enabling guest network access
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Aiden and Isla are setting up a network for their new startup. What is the role of an Intrusion Detection System (IDS) in network security?
To prevent data breaches
To detect and alert on potential security breaches
To encrypt sensitive data
To manage user access
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?