S3 Cyber Lessons Quiz

S3 Cyber Lessons Quiz

5th Grade

13 Qs

quiz-placeholder

Similar activities

การใช้อินเทอร์เน็ตอย่างปลอดภัย

การใช้อินเทอร์เน็ตอย่างปลอดภัย

5th Grade

13 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

VOCABULARIO DE INFORMÁTICA

VOCABULARIO DE INFORMÁTICA

5th Grade

10 Qs

Bibliodatos 1

Bibliodatos 1

5th Grade

10 Qs

Ict/cyberterrorism

Ict/cyberterrorism

KG - Professional Development

9 Qs

What is CyberSecurity?

What is CyberSecurity?

5th Grade

15 Qs

ice breaking kemampuan awal

ice breaking kemampuan awal

1st - 12th Grade

10 Qs

Video games

Video games

KG - Professional Development

18 Qs

S3 Cyber Lessons Quiz

S3 Cyber Lessons Quiz

Assessment

Quiz

Computers

5th Grade

Medium

Created by

Kelsey Swan

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How does encryption work?

Encryption is a method of compressing data for faster transmission.
Encryption involves changing the color of text to make it unreadable.
Encryption is the process of deleting data to protect it from unauthorized access.

Encryption works by converting text into code using a key.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How many possible shift can you do with a Caesar Cipher?

15
30
24

25

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which one of these is NOT a type of Brute Force Attack.

Simple

Dictionary

Reverse

Hard Coded

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What were the allies trying to break at Bletchley Park?

The location of Nazi submarines
The Allied Forces' battle plans

The Enigma code

The German military communications

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Who was the pivotal person to break the code in WWII?

Albert Einstein
Alan Turing
Isaac Newton
Marie Curie

6.

MATCH QUESTION

1 min • 3 pts

Match the following types of cyber attacks

A server is overwhelmed and shut down

Data Breach

Attackers lock your PC and demand money

Ransomware

Data from customers have been leaked

DOS

7.

DRAG AND DROP QUESTION

1 min • 3 pts

​ (a)   is used to make sure your accounts stay secure, it checks you ​ (b)   something and have ​ (c)   to something, e.g your password and your phone for a code.

Two Factor Authentication
know
access
Biometrics
have

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?