Digital Threats

Digital Threats

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Scratch

Scratch

KG - Professional Development

10 Qs

Lesson 1 Introduction to Database System

Lesson 1 Introduction to Database System

10th Grade

10 Qs

PowerPoint Quiz 2

PowerPoint Quiz 2

9th Grade

13 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

College Football

College Football

5th - 12th Grade

11 Qs

CSS9_Q3M2L1_QUIZ3

CSS9_Q3M2L1_QUIZ3

9th Grade

10 Qs

WJEC GCSE ICT Unit 1 E-Mail

WJEC GCSE ICT Unit 1 E-Mail

9th - 10th Grade

13 Qs

Kuis Pengayaan (Aplikasi Sehari-hari?

Kuis Pengayaan (Aplikasi Sehari-hari?

9th Grade

10 Qs

Digital Threats

Digital Threats

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Ms Rahman

Used 64+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Anna is shopping, she is out of her mobile data, she finds free public wifi asking der details only to log in, what should Anna do?

That's awesome lets go online

No way! I am not sharing my details on public WIFI.

I can share with my parents details.

I will look for more options.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these passwords is the most secure?

MyFav_3t1sC@t

ABCD1234

Password

123456789

3.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are examples of biometric security measures?

(SELECT MORE THAN ONE ANSWER)

Eye scan

Voice recognition

Key card

Facial recognition

Fingerprint

4.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are drawbacks of two factor authentication? (Choose all that apply)

It can take less management as users are unlikely to get locked out.

It can take longer to get access as you may have to wait for a code to be sent.

Users may feel it is an invasion of privacy by having their data stored.

The recovery options that are used to reset the account can be exploited

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Which one is the secured website?

www.secure.co.uk

https://www.secure.co.uk

http://www.secure.com

http://www.securewebsite.com

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is not a feature of effective anti-virus software?

Automated data backup

Malware detection

Parental controls

Social media protection

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Rebecca has received a suspicious email from someone pretending to be from her bank.

What sort of threat is this?

Data theft

Eavesdropping

Phishing

Trojan

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?