How not to get hacked

How not to get hacked

10th Grade

8 Qs

quiz-placeholder

Similar activities

Choosing Strong Passwords

Choosing Strong Passwords

9th - 12th Grade

7 Qs

Testout Wireless Networking Chapter 9

Testout Wireless Networking Chapter 9

9th - 12th Grade

12 Qs

EDS Quiz 2

EDS Quiz 2

1st - 12th Grade

11 Qs

Cybersecurity Essentials Quiz

Cybersecurity Essentials Quiz

10th Grade

6 Qs

Identity Theft

Identity Theft

9th - 12th Grade

10 Qs

Windows 10 review (standard)

Windows 10 review (standard)

KG - University

9 Qs

Biometrics-IGCSE ICT

Biometrics-IGCSE ICT

9th - 11th Grade

10 Qs

Detecting and Preventing Cyber Security Threats

Detecting and Preventing Cyber Security Threats

9th - 12th Grade

12 Qs

How not to get hacked

How not to get hacked

Assessment

Quiz

Computers

10th Grade

Hard

DOK Level 1: Recall, DOK Level 2: Skill/Concept

Standards-aligned

Created by

Tracey Shea

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of biometric authentication method?

Password

Fingerprint

PIN

Security Question

Tags

DOK Level 1: Recall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to use device locks on smartphones and computers?

To save battery life

To prevent unauthorized access

To increase internet speed

To improve screen resolution

Tags

DOK Level 1: Recall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the two-factor authentication process?

Using two different passwords

Combining a password with a biometric factor

Using a password and a security question

Using two different devices

Tags

DOK Level 2: Skill/Concept

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does encryption play a role in the authentication process?

It speeds up the login process

It converts data into a secure format

It reduces the need for passwords

It increases the number of authentication steps

Tags

DOK Level 2: Skill/Concept

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in setting up a PIN on a device?

Entering your email address

Choosing a four to six-digit number

Scanning your fingerprint

Answering a security question

Tags

DOK Level 1: Recall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of authentication method?

Password

PIN

CAPTCHA

Username

Tags

DOK Level 1: Recall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain why two-factor authentication is considered more secure than single-factor authentication.

It requires two different types of credentials, making it harder for attackers to gain access.

It uses more complex passwords.

It is faster to log in.

It eliminates the need for passwords.

Tags

DOK Level 2: Skill/Concept

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common practice when setting up a strong password?

Using your birthdate

Using a mix of letters, numbers, and special characters

Using the word "password"

Using a single word from the dictionary

Tags

DOK Level 2: Skill/Concept