Search Header Logo

Uncover the Basics and Keep Your Digital Life Safe. WEEK 1

Authored by Kenechukwu Chiemezie

Professional Development

12th Grade

Uncover the Basics and Keep Your Digital Life Safe. WEEK 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a recent cybersecurity workshop, Chidimma, Musa, and Tolu explored the concept of data security. They came across the term 'data integrity'. What does data integrity primarily ensure?

Accuracy and consistency of data

Accessibility of data to users

Encryption of sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of the National Institute of Standards and Technology (NIST) in cybersecurity?

NIST plays a crucial role in establishing cybersecurity standards and guidelines to enhance organizational security.
NIST provides funding for cybersecurity research and development.
NIST is responsible for enforcing cybersecurity laws and regulations.
NIST primarily focuses on developing new technologies for cybersecurity.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common repercussions for businesses that experience a data breach?

Loss of customer trust, legal penalties, increased security costs

Enhanced customer loyalty

Improved market position

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tactics are used by cyber attackers?You receive an unexpected email from someone claiming to be your school principal. The email says you need to click a link to verify your personal information for an urgent school project. The email address looks slightly off, with one letter different from the official school email address. What tactic is the sender most likely using?

Spoofing
Malware
Phishing
Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major social media platform experiences a data breach, exposing users' personal information like names, email addresses, and phone numbers. What is one likely consequence for users affected by this breach?

Improved security measures for user accounts.
Increased engagement on the platform.
Free premium subscriptions for affected users.
Increased risk of identity theft or phishing attacks.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your school's computer system is attacked, causing a potential data breach. The IT team needs to respond quickly. What is the first step they should take as part of an effective cyber incident response?

Ignore the incident and hope it resolves itself

Identify and contain the attack to prevent further damage

Install a new security on all school computers

Immediately upgrade all hardware without investigating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A popular Nigerian online store detects a data breach that has exposed some customers' information. What actions should the store’s IT team take to handle the situation?

Contain the breach to prevent further damage

Delete all customer data immediately

Notify affected customers and relevant authorities about the breach

Ignore the breach if only a few customers are affected

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?