Cybersecurity Vocab quiz-1.1.1-1.1.2

Cybersecurity Vocab quiz-1.1.1-1.1.2

9th - 12th Grade

18 Qs

quiz-placeholder

Similar activities

Text and Image representation

Text and Image representation

11th Grade

22 Qs

9G4 CS Python Programming Sequence and Vocabs

9G4 CS Python Programming Sequence and Vocabs

9th Grade

13 Qs

Operating System

Operating System

12th Grade

17 Qs

4th Quarter SketchUp Review

4th Quarter SketchUp Review

10th Grade

15 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

20 Qs

Computer Fundamentals

Computer Fundamentals

10th Grade

20 Qs

ICT S120 (Prelim Review)

ICT S120 (Prelim Review)

11th Grade

15 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Cybersecurity Vocab quiz-1.1.1-1.1.2

Cybersecurity Vocab quiz-1.1.1-1.1.2

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Sherry Wilkes

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You need to create files and brute force attack passwords; however, you are not allowed to use the school system network. Which option do you use?

Virtual Operating System

Virtual Software

Virtual Machine

Virtual Network

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Define Digital Footprint

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A process that helps businesses and organizations protect information. The lifecycle always starts with identification of the assets you want to protect.

Cybersecurity Protect your Assets

Cybersecurity Identify your Assets

Cybersecurity Lifestyle

Cybersecurity Lifecycle

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Raw information that consists of basic facts and figures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The practice of protecting internet-connected systems, networks, devices, and data from digital attacks and unauthorized access

Cybersecurity Lifecycle

Cybersecurity

Digital Footprint

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

It appears the man in the picture is attempting to guess or discover information, especially a password. In cybersecurity terms, what is he attempting to do?

Guess personal information

Crack the password or discover information

Spy on the individual who is signing into the computer

Spook the individual who is signing into the computer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which coding language are we using in the virtual lab?

Python Script

CAPTCHA

HTML

Encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?