IT Security

IT Security

3rd - 6th Grade

7 Qs

quiz-placeholder

Similar activities

Cyber Safety Vocabulary

Cyber Safety Vocabulary

3rd Grade

10 Qs

Internet Safety - South High

Internet Safety - South High

3rd - 12th Grade

8 Qs

Computer Ethics

Computer Ethics

3rd - 6th Grade

10 Qs

RECAP CHAP 1

RECAP CHAP 1

1st - 5th Grade

11 Qs

Testing

Testing

6th Grade

11 Qs

Fundamentals of CS - Legal Considerations

Fundamentals of CS - Legal Considerations

3rd - 12th Grade

10 Qs

safe use of social media

safe use of social media

6th - 8th Grade

8 Qs

Computer quiz

Computer quiz

6th Grade

10 Qs

IT Security

IT Security

Assessment

Quiz

Computers

3rd - 6th Grade

Medium

Created by

Robin Archibald

Used 22+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Privacy is about -


Tick all that are correct.

Protecting a person's data

Protecting someone's personal information

Allowing someone access to information

Keeping sensitive information secret

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does IT security mean?

Allowing anyone to access anything on a computer

Sharing passwords with friends

Protecting people’s devices and the software on them

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Two step verification is a security process where logging in to a service requires two separate steps. What might these steps be?


Tick all that are correct.

A password

A code received on a phone by text message

A code generated by an app

A number your friend tells you.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following correctly describe a password?


Click all that are correct.

A secret combination used to access something.

It might be a four-digit number-only code

It's a long and complex sequence of letters and numbers.

It is something that is easy to guess.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the correct definition of Encryption?

A code that is easy to unscramble.

A synonym for another word.

The process of converting information or data into a code that makes it unreadable and inaccessible.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords is the most secure and complex?

!234S6

password

Mvemj5unp

qwerty

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data is called a


You MUST spell correctly!