protection

protection

1st - 5th Grade

8 Qs

quiz-placeholder

Similar activities

robust programs and such

robust programs and such

1st Grade

9 Qs

S3 Cyber Lessons Quiz

S3 Cyber Lessons Quiz

5th Grade

13 Qs

Y9 System security

Y9 System security

5th Grade

10 Qs

Strong Password

Strong Password

1st - 2nd Grade

8 Qs

Third Grade

Third Grade

2nd - 3rd Grade

10 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Computer Viruses and You!

Computer Viruses and You!

5th Grade

10 Qs

Cyber Security Malware Social Engineering

Cyber Security Malware Social Engineering

3rd Grade

12 Qs

protection

protection

Assessment

Quiz

Computers

1st - 5th Grade

Medium

Created by

Я Я

Used 10+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Includes: Locks, Kepads, Biometrics, Security staff, Off Site Backups

Physical protection

Password protection

Word

Examp

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data stored in a different location

Off site backups

Firewall

Password protection

Data encrypted at rest

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

User identification using unique biological identifiers

Firewall

Password protection

Biometrics

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encrypting data that is moving through network(s)

Firewall

Obfuscation

Data encrypted in transit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using a word or phrase as security

Obfuscation

Data encrypted at rest

Password protection

Program MSWord

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Used to protect a computer system or network by controlling data traffic in and out

Data

Network

Firewall

Trafic

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Protection of information from computer viruses

Antivarus

Firewall

Password

No protection

8.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose what you don't need from the list

Biometrics

Firewalls

Security staff

Disk cleanup