Cybersecurity

Cybersecurity

10th - 12th Grade

22 Qs

quiz-placeholder

Similar activities

CSP Unit 2 Study

CSP Unit 2 Study

9th - 12th Grade

19 Qs

Plan maintenance and/or diagnosis of faults in line with job

Plan maintenance and/or diagnosis of faults in line with job

12th Grade

20 Qs

Web Development Unit 1 Quiz

Web Development Unit 1 Quiz

10th Grade

23 Qs

M4 Quiz Practice: Transmitting Information over the Internet

M4 Quiz Practice: Transmitting Information over the Internet

9th - 12th Grade

20 Qs

SYO-601 Domain 1 Practice Questions 1-30

SYO-601 Domain 1 Practice Questions 1-30

12th Grade

20 Qs

Quiz First Time

Quiz First Time

9th - 12th Grade

20 Qs

ADMINISTRASI SISTEM JARINGAN

ADMINISTRASI SISTEM JARINGAN

11th Grade

20 Qs

Kejuruan (AIJ)

Kejuruan (AIJ)

12th Grade - University

25 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Instructional Technology

10th - 12th Grade

Medium

Created by

Maria Morrell

Used 512+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A strong password shouldn't contain :

Capital and small letters

Common marks /? ().......

Numbers

personal data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form is for Biometrics

It is a known and registered physical attribute of a user specifically used for verifying their identity

is used for accessing systems. It makes it more difficult for hackers to access accounts as they have long credentials

It’s a security system that needs more than one method of authentication

A one-time pin or password is used in processing online transactions through which they verify their identity

This authentication needs two different signals from two different channels or networks. It prevents most of the attacks from hacking and identity thefts in online banking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following practices can prevent phishing, one of them can't? What is it?

Use firewalls on your networks and systems

Maintain adequate security

Build a denial of service response plan

Use two-factor authentication wherever possible

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are cyber vulnerabilities unlikely to ever go away?

The government won't allow people to fix them.

Criminals need them ti steal identities.

They are side effects of the freedom and ease of communicating online.

They're protected in a secret base on the moon.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do hackers hack?

To make discoveries

To protect information

To steal information and money

To expose corruption

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is regularly used to secure online communication?

Caesar cipher

Public-key encryption

Morse code

Enigma code

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you tell if a website encrypts its traffic?

Google it

Look for a lock symbol in a URL

All websites encrypt their traffic

Encrypted sites take longer to load

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology