0% found this document useful (0 votes)
14 views13 pages

Cyber Security Term 3

Notes on cyber security and other forms of information in robotics

Uploaded by

katlomore81
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views13 pages

Cyber Security Term 3

Notes on cyber security and other forms of information in robotics

Uploaded by

katlomore81
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13












Cyber Security Questions
1. What is a cyber threat?
2. Which of the following is an example of hacking?
3. True or False: Hacking always involves physical access to a computer system.
4. Which of the following is an email threat?
5. What is a strong password?
6. True or False: A common way for viruses and malware to spread is through email attachments and unsafe
downloads.
7. Which type of malware is designed to lock or encrypt files and demand payment for their release?
8. A strong password should be at least ___ characters long.
9. What is phishing?
10. Match the term with its definition: Pharming
11. True or False: Spoofing involves pretending to be someone else to gain trust and access sensitive information.
12. Which of the following is a best practice for protecting yourself online?
13. What is an impact of a major data breach?
14. Which practice is NOT recommended for protecting yourself online?
15. True or False: Regularly updating your software and antivirus is important for protecting your devices.

You might also like