CSP review unit 2.1

CSP review unit 2.1

26 Qs

quiz-placeholder

Similar activities

VIOEDU TOÁN LỚP 2( VÒNG SƠ LOẠI 1-MÃ 02)

VIOEDU TOÁN LỚP 2( VÒNG SƠ LOẠI 1-MÃ 02)

KG - University

30 Qs

Financial Literacy Ch 4 Vocabulary Review

Financial Literacy Ch 4 Vocabulary Review

KG - University

30 Qs

PENILAIAN AKHIR SEMESTER GANJIL MATEMATIKA

PENILAIAN AKHIR SEMESTER GANJIL MATEMATIKA

KG - University

23 Qs

THÔNG TIN HỌC SINH

THÔNG TIN HỌC SINH

11th Grade

26 Qs

UH Bahasa Jawa

UH Bahasa Jawa

KG - University

27 Qs

S1m_@str0n0my_789101112

S1m_@str0n0my_789101112

9th - 12th Grade

30 Qs

Reading for Pleasure Final Exam '24

Reading for Pleasure Final Exam '24

9th - 12th Grade

30 Qs

CSP review unit 2.1

CSP review unit 2.1

Assessment

Quiz

others

Medium

Created by

Terri Koehler

Used 1+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

1. What is personally identifiable information (PII)?
a. Information that cannot identify a person
b. Information unique to an individual
c. Information shared only on secure websites
d. Information used for general online browsing

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

2. How can PII be exploited through phishing?
a. By deleting cookies regularly
b. By sharing more information online
c. By hovering over suspicious links
d. By tricking individuals into providing personal information

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

3. What is a keylogger?
a. An online game played for data protection
b. Malicious software recording keystrokes
c. A legitimate website for cyber education
d. A protective measure against cyber attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

4. How can cookies be misused by websites?
a. To enhance user experience only
b. To track user visits and activities
c. To provide personalized recommendations
d. To improve website security

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

5. What is a data breach?
a. A protective measure in cybersecurity
b. Legitimate access to secure networks
c. Unauthorized access to confidential data
d. An event to promote online privacy

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

6. What is the encryption algorithm used by Julius Caesar?
a. Symmetric encryption
b. Public key encryption
c. Asymmetric encryption
d. Substitution cipher

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

7. How can individuals protect themselves from data loss online?
a. Share all personal information online
b. Avoid updating software regularly
c. Limit sharing personal details on social media
d. Publicly announce personal data on websites

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?