Knowledge Checker: Understanding Cyber Threats and Safety

Knowledge Checker: Understanding Cyber Threats and Safety

7th Grade

20 Qs

quiz-placeholder

Similar activities

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

Malware

Malware

7th - 10th Grade

22 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Flocabulary - Internet Safety

Flocabulary - Internet Safety

7th - 8th Grade

20 Qs

Test50

Test50

7th - 8th Grade

15 Qs

Cyber Security Homework 2

Cyber Security Homework 2

7th - 9th Grade

15 Qs

Computer Crimes and Computer Ethics

Computer Crimes and Computer Ethics

6th - 10th Grade

21 Qs

Digital Literacy Quiz

Digital Literacy Quiz

7th - 8th Grade

20 Qs

Knowledge Checker: Understanding Cyber Threats and Safety

Knowledge Checker: Understanding Cyber Threats and Safety

Assessment

Quiz

Computers

7th Grade

Hard

Created by

Mr Vallally-Godfrey

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a phishing attack?

To physically damage a computer

To trick people into giving away personal information

To speed up internet connections

To improve computer security

Answer explanation

The main goal of a phishing attack is to trick people into giving away personal information, such as passwords or credit card numbers, often through deceptive emails or websites.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of malware?

Antivirus software

Ransomware

Word processor

Firewall

Answer explanation

Ransomware is a type of malware that encrypts a user's files and demands payment for the decryption key. In contrast, antivirus software and firewalls are security tools designed to protect against malware.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive an email from an unknown sender asking for your password?

Reply with your password

Ignore or delete the email

Forward it to your friends

Click on all the links

Answer explanation

If you receive an email from an unknown sender asking for your password, you should ignore or delete the email. Responding or clicking links can compromise your security.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common social engineering tactic?

Encrypting files

Pretending to be someone trustworthy

Installing updates

Backing up data

Answer explanation

A common social engineering tactic is pretending to be someone trustworthy. This method exploits human psychology to gain access to sensitive information, unlike encrypting files, installing updates, or backing up data, which are security measures.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of ransomware?

To clean your computer

To lock your files and demand payment

To speed up your internet

To update your software

Answer explanation

The main purpose of ransomware is to lock your files and demand payment for their release. It is a malicious software designed to extort money from victims by restricting access to their data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Virus

Worm

Trojan horse

Firewall

Answer explanation

A firewall is not a type of malware; it is a security system that monitors and controls incoming and outgoing network traffic. In contrast, a virus, worm, and Trojan horse are all types of malware designed to harm or exploit systems.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a sign that an email might be suspicious?

It comes from your teacher’s school email address

It asks for your bank details urgently

It contains your full name and correct spelling

It is about your homework

Answer explanation

An email asking for your bank details urgently is a strong sign of suspicion, as legitimate organizations typically do not request sensitive information in this manner. The other options do not indicate a red flag.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?