Edit Game
cybersecurity
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public




Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   30  Close
What should you do if you are being bullied?
report the bully
Which role of cyberbullying is described here: someone aware of cyberbullying and trying to break the cycle
upstander
Which role of cyberbullying is described here: someone aware of cyberbullying but not intervening
bystander
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it can't be easily seen or overheard by teachers and parents.
Discreet
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it contributes to the digital footprint of the victim and the bully.
Permanent
Cyberbullying is especially harmful due to specific characteristics: Which of these is because devices have constant communication with no respite for victims.
Persistent
Victims of Cyberbullying often experience all but which of these ?
financial strain
The use of electronic communication to harass, intimidate, or threaten a person or group of people is called ?
Cyberbullying
Which of these is not considered an impacted area due to cyber attacks?
Mindset
Which of these is not considered to be part of the Internet of Things:
Canvas
The network of devices with the ability to connect and exchange data is known as ?
The internet of things
Measures taken to guard against spying or destructive actions is the meaning of ?
Security
Relating to computers or computer networks is the meaning of ?
cyber
Coding and Computer Science are considered to be the New ?
Literacy
Which of these is a secured site?
https
What does CIA stand for?
confidentially integrity availability
Security experts that hack systems professionally (and legally) are known as:
white hats
A programmer that breaks into someone else's computer system without permission is called a ?
hacker
A piece of malware that holds your computer hostage until something is done is called ?
ransomeware
A software program that monitors your computer usage without your knowledge:
spyware
What does PuP stand for?
potentially unwanted programs
Using general knowledge of human behavior to trick users into breaking security rules is known as ?
Social Engineering
A collection of remotely controlled bots that launch attacks are called:
Bot Network
What is the term for a low-talent hacker who uses easy, well-known techniques to exploit Internet security vulnerabilities.
Script-Kiddie
A standalone malware program that copies itself across computer networks is called a _____________?
Worm
A piece of code that copies itself is called a ____________________.
Virus
A fix applied to a program which are known to solve security issues and are routinely released by programmers is called a _________________.
Security patch
A flaw in a computer program that makes it vulnerable is called a ___________?
Security Hole
What is the generic term for a piece of malicious code?
Malware
What is the term for a "Citizen of Cyberspace".
Netizen