Data Security (G8)

Data Security (G8)

2nd Grade

20 Qs

quiz-placeholder

Similar activities

Identifie les arnaques en ligne

Identifie les arnaques en ligne

2nd Grade

15 Qs

Year 3 ICT Revision

Year 3 ICT Revision

2nd - 3rd Grade

20 Qs

Cybersecurityawareness2024

Cybersecurityawareness2024

1st - 5th Grade

20 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

Cyber Safety

Cyber Safety

KG - University

15 Qs

Quiz sur les virus informatiques

Quiz sur les virus informatiques

2nd Grade

15 Qs

Quiz sur les objectifs des pirates

Quiz sur les objectifs des pirates

2nd Grade

15 Qs

Legislation

Legislation

2nd Grade

18 Qs

Data Security (G8)

Data Security (G8)

Assessment

Quiz

Computers

2nd Grade

Medium

Created by

asep sonjaya

Used 73+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The following is NOT a security risk when a computer is connected to the internet

phishing

smishing

pharming

cooking

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The act of gaining unauthorized access to a computer

Hacking

Vishing

Smishing

Cooking

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Legitimate-looking email is sent to target. The target click a link and sent to a fake website or fooled into giving personal data.

Hacking

Phishing

Pharming

Spamming

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A malicious program is installed in target computer or the target user is accessing malicious website and automatically redirected to a fake website.

Hacking

Phishing

Pharming

Spamming

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A software is sent to target computer. The software gathers data by monitoring keyboard presses. The data sent back to the one who sent the software.

Spamware

Key-logging software

Adware

Ransomware

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Similar to Phishing but instead of using email it uses SMS

Pharming

Cookies

Smishing

Vishing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Similar to Phishing but instead of using email it uses voice mail

Pharming

Cookies

Smishing

Vishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?