Gr 10 Week 6

Gr 10 Week 6

10th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals

Cybersecurity Fundamentals

10th Grade

15 Qs

Digital Security : Cyber Safety Quiz 2

Digital Security : Cyber Safety Quiz 2

9th - 10th Grade

10 Qs

Security Risks

Security Risks

10th Grade

15 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Understand Computer Security and Privacy

Understand Computer Security and Privacy

9th Grade - University

14 Qs

SLR 4 - Cyber Security Threats - part 1

SLR 4 - Cyber Security Threats - part 1

9th - 11th Grade

10 Qs

Digital Footprint and Online Security Quiz

Digital Footprint and Online Security Quiz

10th Grade

15 Qs

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

AQA GCSE Computer Science - 3.6.1.1 Pharming & Shouldering

8th - 10th Grade

10 Qs

Gr 10 Week 6

Gr 10 Week 6

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Ohann Dyk

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is email security?

Email security is only about setting a strong password

Email security involves implementing encryption, strong passwords, multi-factor authentication, spam filters, and regular security updates to prevent phishing attacks, malware infections, and data leaks.

Email security does not involve encryption or multi-factor authentication

Email security is not necessary for personal accounts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is email security important?

Email security is important to share personal information openly

Email security is important to make it easier for hackers to access sensitive data

Email security is important to protect sensitive information, prevent unauthorized access, avoid phishing attacks, and maintain privacy.

Email security is important to increase the risk of phishing attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is key logging?

Key logging is the action of recording mouse movements.

Key logging is the action of encrypting data on a computer.

Key logging is the action of recording the keys struck on a keyboard.

Key logging is the action of monitoring network traffic.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does key logging software work?

Key logging software can only record keystrokes from specific applications.

Key logging software records keystrokes made by a user.

Key logging software encrypts all keystrokes to protect user data.

Key logging software records mouse movements instead of keystrokes.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the risks associated with key logging software?

The risks associated with key logging software include potential exposure of sensitive information, identity theft, financial loss, and privacy breaches.

Improved system performance

Increased security measures

Enhanced data protection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can individuals protect themselves from key logging software?

Share passwords with friends and family

Wear sunglasses while using the computer

Click on every pop-up advertisement

Use anti-keylogging software, be cautious of suspicious links and downloads, keep software updated, use two-factor authentication, and avoid public Wi-Fi for sensitive activities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common email security measures?

Biometric authentication, Public Wi-Fi usage, Sharing passwords via email

Strong passwords, two-factor authentication, caution with phishing emails, software updates, encryption, email filtering

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?