
Cyber Security Best Practices for Journalism
Authored by Payal Bhalani
Journalism
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the purpose of understanding threat models in secure communication methods for journalists?
To identify potential sources for sensitive information
To determine the capabilities of adversaries
To select the most secure communication tools
To establish trust with anonymous sources
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which messaging app is often recommended for its strong focus on privacy and end-to-end encryption?
Signal
Wire
Telegram
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which service provides end-to-end encrypted email options for journalists?
ProtonMail
Tutanota
Gmail
Outlook
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Secure Drop?
An open-source whistleblower submission system
A secure messaging app
A virtual private network
An encrypted storage solution
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool can be used to encrypt internet traffic and make it harder for third parties to intercept or trace communications?
Virtual Private Networks (VPNs)
Tor Browser
Signal
RedPhone
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the Tor Browser and the Tor Network allow users to do?
Access the web anonymously
Encrypt phone calls
Create encrypted containers
Strip metadata from files
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which app can be used for end-to-end encrypted voice calls?
Signal
RedPhone
Wire
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?