Cybersecurity Quiz

Cybersecurity Quiz

8th Grade

25 Qs

quiz-placeholder

Similar activities

PH 1 Kelas 8 -Google hacks code

PH 1 Kelas 8 -Google hacks code

8th Grade

20 Qs

2.3.1 Defensive Design Lesson 1

2.3.1 Defensive Design Lesson 1

8th - 10th Grade

20 Qs

S2 Cyber Resilience and Internet Security

S2 Cyber Resilience and Internet Security

3rd - 11th Grade

20 Qs

SEGURIDAD INFORMATICA 8º P2

SEGURIDAD INFORMATICA 8º P2

8th Grade

20 Qs

Cybersecurity

Cybersecurity

7th - 12th Grade

20 Qs

Cyber security - Year 7

Cyber security - Year 7

8th Grade

20 Qs

Kelas 8: Evaluasi Keamanan Data

Kelas 8: Evaluasi Keamanan Data

8th Grade

25 Qs

Computer Systems and Computer Ethics

Computer Systems and Computer Ethics

8th - 12th Grade

25 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Ryan Lee

Used 10+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that is designed to spread rapidly throughout a network, deleting or 'eating' files along the way. It replicates itself many times over and can be very dangerous.

Protection

Adware

Trojan

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ______ is a hacker that uses another person's code without understanding how it works.

code pirate

script kiddie

newbie

white-hat hacker

kiddie coder

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protects the original work someone created and requires others to obtain permission to use?

Fair use

copyright

password

plagiarism

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using random guesses and computation power in order to decipher a message is called ______.

brute force hacking

trial and error hacking

combination hacking

power hacking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hacker breaks into protected systems and networks to test and assess the security?

Black hat

White hat

Grey hat

Green Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Data Protection Act?

To protect an organisation from hackers

To require organisations that store data on people to use it responsibly and keep it safe

To act as a deterrent to cybercriminals who try to steal data on people

To prevent cybercriminals from spreading a virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cybersecurity?

A system put in place to protect users from exploitation

An office building

A hacking business

An exploit used on other users to gain access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?