8.3 Security of data (1)

8.3 Security of data (1)

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Technical Terms - Internet (A-Z) - Smishing

Technical Terms - Internet (A-Z) - Smishing

12th Grade

10 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

Security risk (Grade 11 IGCSE)

Security risk (Grade 11 IGCSE)

10th - 11th Grade

14 Qs

IGCSE ICT Chapter 8 - Safety & Security

IGCSE ICT Chapter 8 - Safety & Security

9th - 10th Grade

20 Qs

IGCSE Chapter 8 - Safety & Security

IGCSE Chapter 8 - Safety & Security

11th Grade

12 Qs

eSecurity

eSecurity

11th Grade

10 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

8.3 Security of data (1)

8.3 Security of data (1)

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Kabila Maniraja

Used 7+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data threat?

A method to enhance data security

Anything that could harm or steal information

An encryption technique

None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a type of sensitive data?

Personal details

Secret business data

Gaming scores

Money information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for gaining unauthorized access to a computer system?

Hacking

Smishing

Phishing

Pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary tool hackers use for hacking?

Firewall

Internet

Antivirus

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT an effect of hacking?

Deleting data

Corrupting data

Identity theft

Increasing computer speed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can hacking be prevented?

By creating stronger passwords

By sharing passwords

By avoiding encryption

By clicking unknown links

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Redirecting a user to a fake website

Sending fraudulent emails to obtain sensitive data

Capturing keystrokes

None of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?