Knowledge Checker: Understanding Cyber Threats and Safety

Knowledge Checker: Understanding Cyber Threats and Safety

7th Grade

20 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

ICT 8 - Safety and Security

ICT 8 - Safety and Security

6th - 9th Grade

22 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Acceptable Use Policy (Quiz)

Acceptable Use Policy (Quiz)

6th - 8th Grade

15 Qs

Computing

Computing

5th - 7th Grade

15 Qs

Python - Loops & Lists

Python - Loops & Lists

7th - 11th Grade

15 Qs

Computer Safety Quiz

Computer Safety Quiz

6th - 9th Grade

20 Qs

Data Types

Data Types

7th - 9th Grade

15 Qs

Knowledge Checker: Understanding Cyber Threats and Safety

Knowledge Checker: Understanding Cyber Threats and Safety

Assessment

Quiz

Computers

7th Grade

Hard

Created by

Mr Vallally-Godfrey

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a phishing attack?

To physically damage a computer

To trick people into giving away personal information

To speed up internet connections

To improve computer security

Answer explanation

The main goal of a phishing attack is to trick people into giving away personal information, such as passwords or credit card numbers, often through deceptive emails or websites.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of malware?

Antivirus software

Ransomware

Word processor

Firewall

Answer explanation

Ransomware is a type of malware that encrypts a user's files and demands payment for the decryption key. In contrast, antivirus software and firewalls are security tools designed to protect against malware.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive an email from an unknown sender asking for your password?

Reply with your password

Ignore or delete the email

Forward it to your friends

Click on all the links

Answer explanation

If you receive an email from an unknown sender asking for your password, you should ignore or delete the email. Responding or clicking links can compromise your security.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common social engineering tactic?

Encrypting files

Pretending to be someone trustworthy

Installing updates

Backing up data

Answer explanation

A common social engineering tactic is pretending to be someone trustworthy. This method exploits human psychology to gain access to sensitive information, unlike encrypting files, installing updates, or backing up data, which are security measures.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of ransomware?

To clean your computer

To lock your files and demand payment

To speed up your internet

To update your software

Answer explanation

The main purpose of ransomware is to lock your files and demand payment for their release. It is a malicious software designed to extort money from victims by restricting access to their data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Virus

Worm

Trojan horse

Firewall

Answer explanation

A firewall is not a type of malware; it is a security system that monitors and controls incoming and outgoing network traffic. In contrast, a virus, worm, and Trojan horse are all types of malware designed to harm or exploit systems.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a sign that an email might be suspicious?

It comes from your teacher’s school email address

It asks for your bank details urgently

It contains your full name and correct spelling

It is about your homework

Answer explanation

An email asking for your bank details urgently is a strong sign of suspicion, as legitimate organizations typically do not request sensitive information in this manner. The other options do not indicate a red flag.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?