8RS 8.3.6 PLENARY

8RS 8.3.6 PLENARY

8th Grade

12 Qs

quiz-placeholder

Similar activities

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Ethical Issues of I.T.

Ethical Issues of I.T.

7th - 8th Grade

11 Qs

Kiểm tra TX tin 8

Kiểm tra TX tin 8

8th Grade

10 Qs

Examen de Tecnología II BIM

Examen de Tecnología II BIM

6th - 8th Grade

15 Qs

Mengenal Jendela dan Ikon Microsoft Excel

Mengenal Jendela dan Ikon Microsoft Excel

7th Grade - University

15 Qs

EXAMEN-2°AÑO-INFORMATICA P3-2021

EXAMEN-2°AÑO-INFORMATICA P3-2021

1st - 9th Grade

13 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

Computer Security

Computer Security

8th - 10th Grade

10 Qs

8RS 8.3.6 PLENARY

8RS 8.3.6 PLENARY

Assessment

Quiz

Computers

8th Grade

Practice Problem

Medium

Created by

Alexander Woolston

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity workshop, Lily explained that using fingerprints to unlock smartphones is an example of what?

A type of multi-factor authentication

A technique used to test cyber security

The use of biological data for identification

A type of malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Finley is setting up a new online account and needs to create a password. Which option would be the strongest choice for their password?

Short and simple

Contains personal information like name or birthdate

Four random words

Written down on a sticky note

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Connor is setting up his new email account and needs to choose a strong password. Which of the following options would be considered a weak password?

123456

%P@ssw0rd!

Random sequence of characters

A passphrase with more than 20 characters

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Finley is setting up their new online banking account. The bank requires Finley to use a combination of a password and a code sent to their phone. What is this an example of?

Using two authentication factors to verify identity

Using only one method to access an account

Sharing passwords with multiple users

Automatically saved passwords in a browser

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What did Olly and Lily, as cyber security testers, do in their project?

Create new types of malware

Hack into systems for malicious purposes

Test systems for vulnerabilities and security gaps

Monitor online activities of users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake noticed that when he revisits an online store, it remembers his shopping cart contents. How is this achieved?

To store sensitive information securely

To track user activity and preferences

To block access to websites

To encrypt data transmissions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity workshop, Ava learned about various types of malicious software. Which of the following did the instructor clarify is NOT a type of malware?

Virus

Spyware

Ad blocker

Ransomware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?