Cyber Security Review 1

Cyber Security Review 1

9th Grade

17 Qs

quiz-placeholder

Similar activities

Malware

Malware

9th - 11th Grade

15 Qs

Cybersecurity Review

Cybersecurity Review

9th - 12th Grade

14 Qs

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

9th - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

15 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

Cyber Security Review 1

Cyber Security Review 1

Assessment

Quiz

Computers

9th Grade

Easy

Created by

Cami Fissel

Used 40+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malicious software locks or encrypts a victim's data, demanding payment for access?

Cyber security

Sensitive information

Identity theft

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to the unauthorized access and damage to computers and networks?

Sensitive information

Cyber security

Identity theft

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of cyber security?

Sharing data publicly

Protecting data from unauthorized access

Encrypting data for ransom

Stealing personal information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of IoT devices?

Smart home appliances and vehicles.

Traditional desktop computers.

Analog telephones.

Mechanical typewriters.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are vulnerabilities a concern in cybersecurity?

They can be used to improve system efficiency.

They can be exploited to gain unauthorized access.

They help in speeding up internet connections.

They are necessary for system updates.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method to protect against vulnerabilities?

Ignoring system updates.

Using strong passwords and security measures.

Sharing passwords with others.

Disabling all security features.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are regular improvements or fixes to computer programs that help protect against security vulnerabilities called?

Online Safety

Suspicious Emails

Software Updates

Recovery Plan

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?