Keeping data safe-P1

Keeping data safe-P1

9th Grade

10 Qs

quiz-placeholder

Similar activities

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

Information & Internet Security

Information & Internet Security

9th - 12th Grade

15 Qs

Not a quiz about cyber security

Not a quiz about cyber security

7th - 9th Grade

9 Qs

Unit 4 Vocab Quiz

Unit 4 Vocab Quiz

9th - 12th Grade

10 Qs

OSI LAYER

OSI LAYER

KG - Professional Development

10 Qs

2.2 Spyware / Malware

2.2 Spyware / Malware

9th - 10th Grade

9 Qs

Impacts of Computing

Impacts of Computing

9th - 12th Grade

15 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Keeping data safe-P1

Keeping data safe-P1

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Mirna Atout

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of access levels in data security?

To control who can view, edit, or delete data within a system

To increase the speed of data access

To create a backup of the data

To track the location of the data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main task carried out by a firewall?

To compare fingerprint scans against previously stored images

To encrypt files to make the data more secure

To prevent a user from downloading spyware

To examine the traffic between a user's computer and a public network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of anti-spyware software?

To prevent a user from downloading spyware

To examine the traffic between a user's computer and a public network

To compare fingerprint scans against previously stored images

To detect and remove spyware programs installed illegally on a user's computer system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of proving a user's identity by using something they know, have, or something unique to them called?

Authentication

Two-step verification

Biometrics

Access levels

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of two-step verification?

To require two methods of authentication to verify a user's identity

To detect and remove spyware already installed on a device

To prevent access to certain undesirable sites

To encrypt files to make the data more secure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main feature of proxy servers?

Used to direct invalid traffic away from web servers

Prevents direct access to a web server by sitting between the user and the web server

Allows internet traffic to be filtered and keeps users' IP addresses secret

Prevents a user from downloading spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are privacy settings designed to limit?

Who can access and see a user's personal profile

The speed of data access

The number of tries allowed before the system locks the user out

The access rights to the minimum level necessary for users to perform their tasks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?