Protecting your data

Protecting your data

Professional Development

10 Qs

quiz-placeholder

Similar activities

Google Certified Educator Foundations Units 1-2

Google Certified Educator Foundations Units 1-2

Professional Development

14 Qs

Anxiety Disorders

Anxiety Disorders

University - Professional Development

10 Qs

PRE TEST PELATIHAN PENGGUNAAN GOOGLE SITES DENGAN AKUN ID

PRE TEST PELATIHAN PENGGUNAAN GOOGLE SITES DENGAN AKUN ID

Professional Development

10 Qs

App per la didattica digitale - Starter kit

App per la didattica digitale - Starter kit

1st Grade - Professional Development

10 Qs

M4-Q4

M4-Q4

Professional Development

10 Qs

Pengetahuan Google

Pengetahuan Google

Professional Development

10 Qs

Google Educator Level 1

Google Educator Level 1

Professional Development

15 Qs

Testing and Security

Testing and Security

Professional Development

7 Qs

Protecting your data

Protecting your data

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Elankayer Sithirasenan

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a best practice in choosing a good password?

Use dictionary words or names

Use common misspellings of dictionary words

Use computer names or account names

Use special characters and numbers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a NOT a best practice in securing a wireless network?

Enable SSID broadcast

Change the default password

Use WPA2 encryption feasure

Disable WiFi interface when not in use

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting the information into a form where an unauthorized party cannot read it is called

Encryption

Decryption

Hashing

Encoding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a suitable option to ensure that the organizational data is available as and when it is needed?

hot sites

warm sites

cold sites

web sites

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ is an open standard protocol that allows an end user's credentials to access third party applications without exposing the user's password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a best practice when using organizational email service?

do not open emails from unknown users

click open urls that looks suspicious

do not forward emails that looks suspicious

quarantine emails that looks suspicious

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT an emerging cyber security attacks?

Ransomware

Phishing

Boot sector corruption

Cryptojacking

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Professional Development