TEJERO IMIL & DL

TEJERO IMIL & DL

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Staying Safe Online

Staying Safe Online

6th Grade

15 Qs

Internet and Computer Safety Essential Terms

Internet and Computer Safety Essential Terms

6th - 8th Grade

10 Qs

Cyber Security

Cyber Security

6th Grade

14 Qs

Passwords and Cyber Security

Passwords and Cyber Security

7th Grade

15 Qs

Data Types

Data Types

7th - 9th Grade

15 Qs

Data Types - Introduction to Python

Data Types - Introduction to Python

6th - 7th Grade

9 Qs

ICT 8 - Chapter 2 - Privacy Q&A

ICT 8 - Chapter 2 - Privacy Q&A

8th Grade

15 Qs

Networks

Networks

8th - 9th Grade

13 Qs

TEJERO IMIL & DL

TEJERO IMIL & DL

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Kenneth Asuncion

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DICT mean?

Department of Information and Communications Technology

Department of Industrial Commerce and Technology

Department of Information Technology and Communications

Department on Infrastructure and Connections Technology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the primary goal of cyber security?

To increase internet speed

To prevent unauthorized access to computer systems

To develop new software programsT

To hack into other systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not an example of a cyber security threat?

Malware

Phishing

Firewall

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most effective way to protect against a phishing attack?

Keep software up to date

Use strong passwords

Use antivirus software

Be cautious of suspicious emails and links

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall?

To block unauthorized access to a network

To protect against viruses and malware

To encrypt sensitive data

To prevent physical theft of computer equipment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of two-factor authentication?

Entering a username and password

Scanning a fingerprint and entering a password

Answering a security question and entering a password

Entering a passphrase

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most secure way to store passwords?

Writing them down on a piece of paper

Storing them in a plain text file on a computer

Using a password manager

Using a simple password that is easy to remember

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?