Cyber Games T2

Cyber Games T2

9th Grade

10 Qs

quiz-placeholder

Similar activities

CyberSecurity Basics

CyberSecurity Basics

6th - 12th Grade

10 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Ιοί Υπολογιστών

Ιοί Υπολογιστών

7th - 9th Grade

11 Qs

Lesson 8 - Malware

Lesson 8 - Malware

7th - 9th Grade

15 Qs

Computer Ethics and Security

Computer Ethics and Security

6th - 10th Grade

10 Qs

Network Security

Network Security

9th Grade

13 Qs

network security

network security

9th Grade

15 Qs

Computer Security

Computer Security

7th - 10th Grade

12 Qs

Cyber Games T2

Cyber Games T2

Assessment

Quiz

Computers

9th Grade

Hard

Created by

LTC Jimmy Thomas

Used 13+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Creeper was __________________________ .

The German system for making secret codes

A term for people who create computer viruses

A mechanism for breaking code

A self-replicating program found on the ARPANET

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Albert wants to send a message to Bernie, but he fears that Elaine may try to intercept the message. Albert should consider ______________________ the message.

Texting

Encrypting

Resending

Duplicating

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passwords, one-time pins, and biometrics (such as a fingerprint or eye scanner)

are all methods of________.

Authorization

Authentication

Multi-Factor Authentication

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

Threats

Vulnerabilities

Attacks

Authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access privileges granted to a user, program, or process or the act of granting those privileges.

Authorization

Script Kiddies

Cyber Criminals

Corporate Spies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________amateur hackers with little experience; use scripts and programs made by someone else.

Authorization

Script Kiddies

Cyber Criminals

Corporate Spies

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____________infects a computer or network to render it useless and displays a message that demands a fee be paid in order to get the contents back.

Ransomeware

Spyware

Trojan Horse

Logic Bomb

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?