Cyber safety

Cyber safety

6th Grade

20 Qs

quiz-placeholder

Similar activities

Quiz on Cyber Security - See Yourself in Cyber

Quiz on Cyber Security - See Yourself in Cyber

KG - 12th Grade

20 Qs

Cyberharcèlement 6ème et 5ème

Cyberharcèlement 6ème et 5ème

6th Grade

22 Qs

Eva. 1BIM 4to PRIM

Eva. 1BIM 4to PRIM

4th Grade - University

20 Qs

Tech in May, Current Events

Tech in May, Current Events

6th - 8th Grade

20 Qs

Understanding Data and Automation

Understanding Data and Automation

6th Grade

15 Qs

Library Terms #2

Library Terms #2

4th - 6th Grade

20 Qs

SA Chapters 7.1 - 7.3

SA Chapters 7.1 - 7.3

KG - Professional Development

21 Qs

Prueba Diagnóstica de EPT

Prueba Diagnóstica de EPT

6th - 8th Grade

20 Qs

Cyber safety

Cyber safety

Assessment

Quiz

Other

6th Grade

Hard

Created by

EENAYA GARG

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

In which year the term hacking was coined

1965-67

1970-80

1980-82

1955-60

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

what should we do if we get a clickjack

Report the incident and avoid interacting with suspicious elements.
Click on all links to see what happens.
Ignore the warning and continue browsing.
Disable your browser's security settings.

3.

FILL IN THE BLANK QUESTION

1 min • 2 pts

_____________is also a type of malware but is mostly used for surveillance.

4.

FILL IN THE BLANK QUESTION

1 min • 2 pts

__________ is the process of identifying someone's or something's identity, making sure that something is true, genuine, or valid.

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A__________ is a method used for the encrypted, electronic stamp of authentication on digital information such as documents, emails, macros, or digital content.

digital signature
authentication token
digital certificate
encrypted password

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

____: A tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples.

Network monitoring tool
Antivirus software

YARA

Data recovery application

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts


Trial and Error method of hacking passwords is called

Keylogging
Social Engineering
Brute Force Attack
Phishing Attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?