Data Ethics and Security

Data Ethics and Security

Professional Development

8 Qs

quiz-placeholder

Similar activities

NOATS Quizzes

NOATS Quizzes

Professional Development

13 Qs

Cybersecurity Assessment

Cybersecurity Assessment

Professional Development

8 Qs

CyberSecurity

CyberSecurity

6th Grade - Professional Development

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

9 Qs

Social Engineering

Social Engineering

8th Grade - Professional Development

8 Qs

Quiz Webinar security awaraness

Quiz Webinar security awaraness

Professional Development

10 Qs

cyberops14

cyberops14

Professional Development

10 Qs

Week 2

Week 2

Professional Development

11 Qs

Data Ethics and Security

Data Ethics and Security

Assessment

Quiz

Religious Studies, Fun, Computers

Professional Development

Medium

Created by

Saul Goodman

Used 8+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Media Image

What is a safe password?

5aulGoodm5n

password12345

admin

Mm_f."Ck:$VE,kt6

Answer explanation

Don' use common passwords or include your name/personal info, use a mix of different characters and symbols

2.

FILL IN THE BLANK QUESTION

45 sec • 5 pts

Media Image

what type of email scam involves you clicking on a malicious link that is sent to you?

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which photo could reveal personal info about yourself?

Media Image
Media Image
Media Image
Media Image

Answer explanation

Be carefull of what you upload online as it can reveal unwanted information

4.

MULTIPLE CHOICE QUESTION

30 sec • 6 pts

Is cloud computing immune from cyber attacks?

Yes, large companies are immune to these attacks

No, Anyone is vulnerable to cyber attacks even companies

Answer explanation

Media Image

No, million of online databases are compromised around the world every day, even large companies like Facebook are not invulnerable to these attacks

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is unethical use of user data?

Selling it to advertisers

Collecting data and using with malicious intent

Storing passwords in a database so the user can access their account

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

How can computer be used ethically

Utilizing social media

watching movies

Doxxing people online

Using chatrooms

7.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

What is Doxxing

Search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent

Looking for a long lost person online utilizing public databases and social media to find said long lost person

Threatening to publicize archived tweets in an inflammatory manner

Unboxing and building a high-end production quality computer for large companies and software intensive applications.

8.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What connections are relatively safe?

Public coffee shop

Home internet

Airport wifi

McDonalds WiFry

Answer explanation

All public internet connection are very vulnerable to attacks however home internet has the possibility of becoming compromised