Unit 3 - page 276 - Vocabulary

Unit 3 - page 276 - Vocabulary

6th Grade

15 Qs

quiz-placeholder

Similar activities

6th Grade ELA Midterm Review

6th Grade ELA Midterm Review

6th - 8th Grade

20 Qs

2/3 6th Grade

2/3 6th Grade

6th Grade

10 Qs

Biometrics are not Better

Biometrics are not Better

6th Grade

12 Qs

Study Set #17 Vocab Test

Study Set #17 Vocab Test

6th Grade

10 Qs

Grammar revision Present tenses B1

Grammar revision Present tenses B1

1st - 7th Grade

18 Qs

Unit 3A- ELA 6 Vocabulary Quiz

Unit 3A- ELA 6 Vocabulary Quiz

6th Grade - University

18 Qs

The Watsons Go to Birmingham-1963 Ch 8 Vocabulary

The Watsons Go to Birmingham-1963 Ch 8 Vocabulary

6th - 8th Grade

14 Qs

Context Clues

Context Clues

6th Grade

10 Qs

Unit 3 - page 276 - Vocabulary

Unit 3 - page 276 - Vocabulary

Assessment

Quiz

English

6th Grade

Hard

DOK Level 1: Recall

Standards-aligned

Created by

Vanessa Alvarez

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the meaning of the word "security" in the context of computer systems?

The state of being free from danger or threat

The process of finding and fixing software bugs

The act of bypassing a system's defenses

The unauthorized access to data

Tags

DOK Level 1: Recall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which word best describes a weakness in a computer system that can be exploited?

Security

Vulnerability

Breaches

Hacked

Tags

DOK Level 1: Recall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "exploiting" refer to in cybersecurity?

Protecting a system from threats

Identifying and fixing vulnerabilities

Taking advantage of a vulnerability

Monitoring network traffic

Tags

DOK Level 1: Recall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does it mean if a security measure is "bypassed"?

It is strengthened

It is ignored or avoided

It is updated

It is monitored

Tags

DOK Level 1: Recall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are "breaches" in the context of cybersecurity?

Unauthorized access to data

Security measures

Software updates

Network protocols

Tags

DOK Level 1: Recall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does it mean if a system is "hacked"?

It is protected from threats

It is updated with new software

It is compromised by unauthorized access

It is monitored for vulnerabilities

Tags

DOK Level 1: Recall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following words is a synonym for "security"?

Danger

Protection

Exploitation

Breach

Tags

DOK Level 1: Recall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?