
Cyber Connections Activity - 60 min session
Authored by Michelle Luna-Lopez
Computers
6th - 8th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cybersecurity, what does CIA stand for?
Confidentiality, Integrity, Availability
Central Intelligence Agency
Cybersecurity Investigation Association
Cyber Investigation Act
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the CIA Triad primarily focus on?
Data storage
Information Security
Marketing
HR
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why might hackers want control over your identity?
To inform you of weak passwords
To commit crimes or spy on you
To send you personalized ads
To become your friend
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does an ethical hacker test?
Software licenses
User interfaces
Websites, apps, and networks
Marketing strategies
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of ethical hacking?
To create new software
To design apps
To uncover vulnerabilities
To manage IT projects
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of person might be suited for a career as a Cybersecurity Analyst?
Someone who loves to paint
Someone who prefers outdoor work
Someone who enjoys solving problems
Someone who loves science
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common task for a Cybersecurity Analyst
Designing buildings
Detecting and stopping cyber attacks
Writing scripts
Painting landscapes
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?