
3. How Not to Get Hacked Authentication and Device Locks
Authored by JAMES COVE
Computers
10th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name of the cyber security company where the speaker works?
Blue buoyant
Green Guard
Yellow Fortress
Red Shield
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many years did the speaker work at the FBI?
10 years
12 years
15 years
20 years
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it crucial to protect your email account?
It contains your social media passwords
It stores your personal photos
It is linked to your phone number
It can lead to hacking of other important accounts
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does two-factor authentication require?
A security question and a password
Two passwords
A fingerprint and a password
A password and a security code
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the two factors in two-factor authentication?
A fingerprint
A password
A security question
A retina scan
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do to secure your phone and computer?
Use strong passwords
Leave them unlocked
Share your passwords with friends
Use a simple password
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended action when your device goes to sleep?
Leave it unlocked
Set it to automatically lock
Turn it off
Disconnect from the internet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?