E-SAFETY1

E-SAFETY1

KG - Professional Development

6 Qs

quiz-placeholder

Similar activities

GE ELECTIVE 1 QUIZ_INTERNET AS A RESOURCE

GE ELECTIVE 1 QUIZ_INTERNET AS A RESOURCE

University

11 Qs

LISTS 14, 15 & 16 SPELLING ABEKA

LISTS 14, 15 & 16 SPELLING ABEKA

6th - 9th Grade

10 Qs

FAMILY TIES : LESSON 2 "Words related to family"

FAMILY TIES : LESSON 2 "Words related to family"

5th Grade

11 Qs

Mengenai OBE PSP

Mengenai OBE PSP

University

10 Qs

Swamy Vivekananda

Swamy Vivekananda

3rd - 8th Grade

10 Qs

BUSM 4570 Hotel Utilities Management W9

BUSM 4570 Hotel Utilities Management W9

University

11 Qs

Pretest ECG Examination

Pretest ECG Examination

KG - University

10 Qs

Lesson 3- Editing and Correcting Documents

Lesson 3- Editing and Correcting Documents

7th - 12th Grade

10 Qs

E-SAFETY1

E-SAFETY1

Assessment

Quiz

Education

KG - Professional Development

Medium

Created by

STALIN S.P.

Used 2+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The responsible rules and behaviours designed to keep individuals safe whenever connected to the Internet is the definition of

Cyber Security

Cyber Ethics

Cyber Safety

Cyber Space

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. Which of the following is appropriate to post?

A picture of something involving an address

Your location

A picture of your dog

Your phone number

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. What is

NOT a benefit of BYOD?

Reduced costs.

Viruses and security issues.

Familiarity.

Ownership

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What

should an effective security policy include?

An overview of corporate and IT goals and objectives.

A complete list of mobile devices allowed within the organization

Definitions of what information is sensitive and who should have access to it

A detailed description of VPN operations and support procedures.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. What does the acronym AUP stand for?

Acceptable User Practices

Accountable User Policies

Allowed User Practices

Acceptable Use Policy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. What name would you give to an email attachment that may harm your computer?

Phishing

Spam

Malware