Cybersecurity

Cybersecurity

10th - 12th Grade

22 Qs

quiz-placeholder

Similar activities

Pekerjaan Dasar Elektromekanik

Pekerjaan Dasar Elektromekanik

10th Grade

20 Qs

Animaciones en mblock

Animaciones en mblock

10th Grade

18 Qs

martes grupo D

martes grupo D

6th Grade - Professional Development

19 Qs

CPA 3NT Paper 1 Quiz 6 (Ping Yi Sec)

CPA 3NT Paper 1 Quiz 6 (Ping Yi Sec)

10th - 12th Grade

20 Qs

Gêneros Digitais e Suas Funções

Gêneros Digitais e Suas Funções

10th Grade

19 Qs

PALANCAS

PALANCAS

9th - 12th Grade

20 Qs

TIN HỌC 7

TIN HỌC 7

9th Grade - University

22 Qs

L'aide au stationnement: le radar de recul

L'aide au stationnement: le radar de recul

10th - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Instructional Technology

10th - 12th Grade

Medium

Created by

Maria Morrell

Used 514+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A strong password shouldn't contain :

Capital and small letters

Common marks /? ().......

Numbers

personal data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form is for Biometrics

It is a known and registered physical attribute of a user specifically used for verifying their identity

is used for accessing systems. It makes it more difficult for hackers to access accounts as they have long credentials

It’s a security system that needs more than one method of authentication

A one-time pin or password is used in processing online transactions through which they verify their identity

This authentication needs two different signals from two different channels or networks. It prevents most of the attacks from hacking and identity thefts in online banking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following practices can prevent phishing, one of them can't? What is it?

Use firewalls on your networks and systems

Maintain adequate security

Build a denial of service response plan

Use two-factor authentication wherever possible

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are cyber vulnerabilities unlikely to ever go away?

The government won't allow people to fix them.

Criminals need them ti steal identities.

They are side effects of the freedom and ease of communicating online.

They're protected in a secret base on the moon.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do hackers hack?

To make discoveries

To protect information

To steal information and money

To expose corruption

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is regularly used to secure online communication?

Caesar cipher

Public-key encryption

Morse code

Enigma code

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you tell if a website encrypts its traffic?

Google it

Look for a lock symbol in a URL

All websites encrypt their traffic

Encrypted sites take longer to load

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?