
Gr 10 Week 6

Quiz
•
Computers
•
10th Grade
•
Easy
Ohann Dyk
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is email security?
Email security is only about setting a strong password
Email security involves implementing encryption, strong passwords, multi-factor authentication, spam filters, and regular security updates to prevent phishing attacks, malware infections, and data leaks.
Email security does not involve encryption or multi-factor authentication
Email security is not necessary for personal accounts
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is email security important?
Email security is important to share personal information openly
Email security is important to make it easier for hackers to access sensitive data
Email security is important to protect sensitive information, prevent unauthorized access, avoid phishing attacks, and maintain privacy.
Email security is important to increase the risk of phishing attacks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is key logging?
Key logging is the action of recording mouse movements.
Key logging is the action of encrypting data on a computer.
Key logging is the action of recording the keys struck on a keyboard.
Key logging is the action of monitoring network traffic.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does key logging software work?
Key logging software can only record keystrokes from specific applications.
Key logging software records keystrokes made by a user.
Key logging software encrypts all keystrokes to protect user data.
Key logging software records mouse movements instead of keystrokes.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the risks associated with key logging software?
The risks associated with key logging software include potential exposure of sensitive information, identity theft, financial loss, and privacy breaches.
Improved system performance
Increased security measures
Enhanced data protection
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can individuals protect themselves from key logging software?
Share passwords with friends and family
Wear sunglasses while using the computer
Click on every pop-up advertisement
Use anti-keylogging software, be cautious of suspicious links and downloads, keep software updated, use two-factor authentication, and avoid public Wi-Fi for sensitive activities.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some common email security measures?
Biometric authentication, Public Wi-Fi usage, Sharing passwords via email
Strong passwords, two-factor authentication, caution with phishing emails, software updates, encryption, email filtering
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Found. of IT: Security Threats - A

Quiz
•
9th - 12th Grade
13 questions
J277 1.4 Network Security Quiz (Forms of Attack)

Quiz
•
9th - 12th Grade
15 questions
Bezpieczeństwo w sieci

Quiz
•
9th - 12th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
10 questions
GCSE OCR Computing 1.4.1 - Threats to Computer Systems

Quiz
•
10th Grade
15 questions
DETECTING AND PREVENTING CYBER SECURITY THREATS

Quiz
•
9th - 12th Grade
12 questions
security and ethic 1

Quiz
•
10th Grade
13 questions
Phishing, Spam and Fake websites

Quiz
•
7th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade