
U3 : Detective Diaries: Hacked: A Glimpse into the Future
Authored by Raquel Antón
English
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. What is the term for a fraudulent attempt to obtain sensitive information, such as passwords or credit card details, by pretending to be a trustworthy entity?
spyware
phishing
encryption
bypass
Answer explanation
The correct term is 'phishing', which refers to fraudulent attempts to acquire sensitive information by masquerading as a trustworthy entity. Other options like spyware and encryption do not fit this definition.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of malicious software designed to secretly gather information from a computer?
Firewall
Encryptor
Spybot
Password Manager
Answer explanation
Spybot is a type of malicious software specifically designed to secretly gather information from a computer, making it the correct choice. Firewalls, encryptors, and password managers serve different security purposes.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does it mean to "encrypt" data?
To delete it permanently
To protect it by converting it into a secret code
To share it with multiple users
To copy it to another device
Answer explanation
To "encrypt" data means to protect it by converting it into a secret code, making it unreadable to unauthorized users. This ensures confidentiality and security of the information.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker gains unauthorized access to a computer system by finding a way to avoid security measures. This is called…
Bypassing
Encrypting
Breaching
Cracking
Answer explanation
The correct answer is 'Bypassing' because it specifically refers to avoiding security measures to gain unauthorized access. 'Breaching' is more general, while 'encrypting' and 'cracking' do not directly relate to avoiding security.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a cyberattack?
A type of firewall that protects against hackers
A planned attempt to damage or gain unauthorized access to a computer system
A method of storing encrypted passwords
A way to recover lost data
Answer explanation
A cyberattack refers to a planned attempt to damage or gain unauthorized access to a computer system, making the second choice the correct answer. The other options describe different cybersecurity concepts.
6.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Complete the sentence: "By 2030, cybersecurity experts (a) (develop) new ways to prevent cyberattacks."
Answer explanation
The correct choice is 'will have developed' because it indicates a future perfect tense, suggesting that by 2030, cybersecurity experts will complete the action of developing new ways to prevent cyberattacks.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By the time the IT team notices the breach, the hacker ______ all the data."
will steal
is stealing
wil have stolen
steals
Answer explanation
The correct choice is 'will have stolen' because it indicates that the action of stealing the data is completed by the time the IT team notices the breach, fitting the future perfect tense context.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?