Digital Threats

Digital Threats

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Chapter-8: Safety and security

Chapter-8: Safety and security

9th - 10th Grade

10 Qs

BTEC Level 2 Networking and Cybersecurity Revision

BTEC Level 2 Networking and Cybersecurity Revision

9th - 12th Grade

13 Qs

WWW

WWW

10th Grade

15 Qs

Security Presentation Quiz

Security Presentation Quiz

12th Grade - University

15 Qs

Recognition Systems

Recognition Systems

10th Grade

14 Qs

4.4 Prevention methods

4.4 Prevention methods

9th - 11th Grade

10 Qs

Understanding the CIA Triad in Cybersecurity

Understanding the CIA Triad in Cybersecurity

10th Grade

15 Qs

Communication & Networking - IP, MAC, Packets & Protocols

Communication & Networking - IP, MAC, Packets & Protocols

2nd - 12th Grade

10 Qs

Digital Threats

Digital Threats

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ms Rahman

Used 63+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Anna is shopping, she is out of her mobile data, she finds free public wifi asking der details only to log in, what should Anna do?

That's awesome lets go online

No way! I am not sharing my details on public WIFI.

I can share with my parents details.

I will look for more options.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these passwords is the most secure?

MyFav_3t1sC@t

ABCD1234

Password

123456789

3.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are examples of biometric security measures?

(SELECT MORE THAN ONE ANSWER)

Eye scan

Voice recognition

Key card

Facial recognition

Fingerprint

4.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are drawbacks of two factor authentication? (Choose all that apply)

It can take less management as users are unlikely to get locked out.

It can take longer to get access as you may have to wait for a code to be sent.

Users may feel it is an invasion of privacy by having their data stored.

The recovery options that are used to reset the account can be exploited

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Which one is the secured website?

www.secure.co.uk

https://www.secure.co.uk

http://www.secure.com

http://www.securewebsite.com

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is not a feature of effective anti-virus software?

Automated data backup

Malware detection

Parental controls

Social media protection

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Rebecca has received a suspicious email from someone pretending to be from her bank.

What sort of threat is this?

Data theft

Eavesdropping

Phishing

Trojan

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?