IT and Data Security

IT and Data Security

5th - 11th Grade

12 Qs

quiz-placeholder

Similar activities

Five Nights At Freddy's: Security Breach Quiz

Five Nights At Freddy's: Security Breach Quiz

KG - Professional Development

13 Qs

Health 9 Quiz Unintentional Injuries

Health 9 Quiz Unintentional Injuries

9th Grade

15 Qs

2nd Quarter_Lesson 3

2nd Quarter_Lesson 3

10th Grade

10 Qs

Creative Technology - SUMMATIVE NO. 1

Creative Technology - SUMMATIVE NO. 1

10th Grade

10 Qs

Gideon

Gideon

2nd - 12th Grade

10 Qs

TYPES OF NETWORK

TYPES OF NETWORK

9th - 12th Grade

10 Qs

Regolamento Futsal 2021/2022

Regolamento Futsal 2021/2022

1st - 5th Grade

10 Qs

INTEREST RATE CALCULATOR

INTEREST RATE CALCULATOR

10th Grade

10 Qs

IT and Data Security

IT and Data Security

Assessment

Quiz

Other

5th - 11th Grade

Practice Problem

Medium

Created by

Jason Mongo

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Attackers can gain access to your device through an unsecured network.

True

False

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

I should always click on links in emails to check if the website is legitimate.

True

False

Answer explanation

If the link is compromised, by clicking the link you have already allowed access to whatever was planted on the site.

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

By using a complex password (mixture of letters, numbers and symbols), it is impossible for hackers to break through

True

False

Answer explanation

No password is impossible to crack. It just takes longer.

passw0rD - 16min at most

$j7%#n@qTY - 609 years at most

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Attackers can use a combination of attacks E.g. Phishing > Malware > DOS

True

False

Answer explanation

A combination of attacks is usually used to increase the chances of a successful penetration of the system and decreases the chances of early detection.

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is safe to plug in any device to your computer, as long as you have used it before

True

False

Answer explanation

Even if the device is being used before, there is a chance it may already have been infected or compromised. The malware within just has not been activated yet.

6.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of the following is caused by a cyber attack?

Loss of personal data

System Disabled

Forgetting your password

Manipulation of Information

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a form of cyber attack?

Illegal Gatherings

Phishing

Fishing

Search & Arrest

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?