Cyber Security Best Practices for Journalism

Cyber Security Best Practices for Journalism

University

10 Qs

quiz-placeholder

Similar activities

Challenges in Forensic Investigations

Challenges in Forensic Investigations

University

11 Qs

Once Upon a Time Season 1

Once Upon a Time Season 1

9th Grade - University

15 Qs

Presenting - Week 7 (first years)

Presenting - Week 7 (first years)

University

10 Qs

C2L Blogs & Infographics

C2L Blogs & Infographics

11th Grade - University

15 Qs

AP Review #3 - Punctuation & Grammar

AP Review #3 - Punctuation & Grammar

University

10 Qs

COMMONWEALTH GAMES

COMMONWEALTH GAMES

University

10 Qs

Research Critique

Research Critique

University

10 Qs

Flash Photography Quiz

Flash Photography Quiz

University

10 Qs

Cyber Security Best Practices for Journalism

Cyber Security Best Practices for Journalism

Assessment

Quiz

Journalism

University

Hard

Created by

Payal Bhalani

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of understanding threat models in secure communication methods for journalists?

To identify potential sources for sensitive information

To determine the capabilities of adversaries

To select the most secure communication tools

To establish trust with anonymous sources

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which messaging app is often recommended for its strong focus on privacy and end-to-end encryption?

Signal

WhatsApp

Wire

Telegram

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which service provides end-to-end encrypted email options for journalists?

ProtonMail

Tutanota

Gmail

Outlook

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Secure Drop?

An open-source whistleblower submission system

A secure messaging app

A virtual private network

An encrypted storage solution

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool can be used to encrypt internet traffic and make it harder for third parties to intercept or trace communications?

Virtual Private Networks (VPNs)

Tor Browser

Signal

RedPhone

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Tor Browser and the Tor Network allow users to do?

Access the web anonymously

Encrypt phone calls

Create encrypted containers

Strip metadata from files

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which app can be used for end-to-end encrypted voice calls?

Signal

RedPhone

WhatsApp

Wire

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?