Password Power-Ups
Phishing Frenzy
Cyber Sleuths
Data Defenders
Malware Mayhem
100

True or False: Cybersecurity is only useful if you want to become a professional hacker.

False

Notes: Correct! Programming and computer science has many applications outside of being a professional programmer.

100

Which of the following most accurately describes the Internet of Things?


Malicious hackers intent on stealing confidential information like credit card numbers or email addresses


All of the websites that a person can currently access online


Internet service providers who make it possible to go online


The network of devices with the ability to connect and exchange data

The network of devices with the ability to connect and exchange data

100

True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.


True


False

False

100

True or False. The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don’t matter or are not part of a person’s digital footprint.


True


False

False

100

True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can’t see or overhear cyberbullying).


False


True

True

200

Which of the following is not true about cybersecurity?

Recent data breaches have released personal information of hundreds of millions of people.

Cybersecurity is the protection of computer systems, networks, and data from digital attacks.

As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks.

Cyber attacks can devastate large organizations, but individuals are largely unaffected.

Cyber attacks can devastate large organizations, but individuals are largely unaffected.

Notes: Correct! This statement is not true. Individuals and small businesses should take necessary precautious to protect their data as well!  

200


Which of the following devices is not a part of the Internet of Things?


A watch that allows you to measure and track your activity through a mobile app

A security system that lets you remotely monitor your home

A physical combination padlock for your gym locker

A car with a built-in navigation system

A physical combination padlock for your gym locker

200

What is the main fear that ransomware attacks center around?


Fear of hackers


Fear of the Internet


Fear of being spied on


Fear of losing important files

Fear of losing important files

200

A deceptive email is typically used in a phishing attack. Which of the following is most likely a legitimate email address?


jacob@homedepot23.com


nathaniel@paypal.info1.com


mikayla@applle.com


jamal@netflix.com

jamal@netflix.com

200

What should be the primary focus of keeping information secure?


Educating users on the dangers of phishing attempts


Encrypting all personal data


Ensuring the confidentiality, integrity, and availability of data


Implementing a strong password policy

Ensuring the confidentiality, integrity, and availability of data

300

Which of the following devices is not connected to the Internet of Things?


An AM/FM radio without any bluetooth or Internet connection capabilities

A wearable device that measures your physical activity and allows you to track your activity through a mobile app

A smart thermostat that allows you to remotely control your home’s temperature through a mobile app

A digital baby monitor that allows you to stream video and audio of your nursery from the Internet

An AM/FM radio without any bluetooth or Internet connection capabilities 

Notes: Correct!

300


Alice is checking her grades on a school computer in the library, and she forgets to log out before she leaves. Bob gets on the computer after her, and he sees her grades for all of her classes.

Which part of the CIA triad was broken?


Confidentiality

Integrity

Availability

All of the above

Confidentiality

300

Sarah puts a lock on her diary so only she can read it. Her little brother breaks the lock and reads her diary.


Which part of the CIA triad was broken?


Confidentiality


Integrity


Availability


All of the above

Confidentiality

300

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email?


Knowing your full name


Knowing your hobbies


Knowing a recent store that you shopped at


Knowing your address

Knowing a recent store that you shopped at

300

Which of the following are best practices for having a secure password?


Creating a password that is long in length


Creating a password that has a combination of letters, numbers, and special characters


Using a password manager


All of the above

All of the above

400

Which of the following is true about the Internet of Things?

I. The Internet of Things is the network of devices with the ability to connect and exchange data.

II. The Internet of Things increases our vulnerability to cyber attacks.

III. The Internet of Things is purely positive–there are no negative consequences to increased connectivity

I and II

Notes: Correct!

400

Which of the following statements are true?

A. There has been a decrease in the number of cyber attacks in the past decade.

B. Cybersecurity is the protection of computer systems, networks, and data from digital attacks.

C. Cyber attacks in the past few years have impacted individuals, governments, and organizations.


A only


B only


B and C


A, B and C

B and C

400

What does a ransomware hacker do when they gain access to a user’s system?


Encrypt important files


Delete key system data


Copy a users personal data


Move operating system data

Encrypt important files

400

Which of the following statements are true about cyberbullying:

I. Cyberbullying uses electronic communication to bully a person.

II. Cyberbullying is a crime in many states.

III. Instances of cyberbullying do not affect the digital footprint of the victim.

IV. Cyberbullying hurts real people even though we can’t always see their reactions online.


I and IV


II and III


I, II, and IV


All of the above

I, II, and IV

400

Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this?


wind +power


"wind" +Germany


"wind power" -Spain


"wind power" +Germany

"wind power" +Germany

500

Which of the following is true about jobs in the field of cybersecurity?

There are a lot of unfilled positions in cybersecurity right now, but in the next few years all of those positions will be filled.

Right now there aren’t many unfilled cybersecurity positions, but there will be more in the next couple of years.

There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.

There are too many qualified cybersecurity professionals. There are no unfilled positions now, and there won’t be any unfilled positions in the next few years.

There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.

500

Cynthia discovers that she has the ability to modify the lunch menu posted on her school’s website. She edits the website so for lunch every day, it says “Green Eggs and Ham”.


Which part of the CIA triad was broken?


Confidentiality


Integrity


Availability


All of the above

Integrity

500

What is the core technology that allows digital devices to connect and transmit data with each other?


sensors


networks


smart phones


a global positioning sensor or GPS

networks

500

Which of the following can help you to maintain your digital footprint?

I. Using privacy settings to limit your exposure

II. Posting long rants when you are angry about something

III. Reviewing posts you are tagged in and taking action if needed

IV. Googling yourself on a regular basis


I and IV


I, II and III


I, III, and IV


All of the above.

I, III, and IV

500

Which of the following actions will help you avoid violation of copyright laws?


Always cite sources


Check the copyright to make sure it can be used by others without permission


Use public domain media


All of these answers

All of these answers