11al网络安全

11al网络安全

11th Grade

22 Qs

quiz-placeholder

Similar activities

Pengantar Teknologi Informasi 8

Pengantar Teknologi Informasi 8

University

17 Qs

MOTD 2 DSE-C

MOTD 2 DSE-C

University

20 Qs

Quize FTP Server

Quize FTP Server

10th - 11th Grade

19 Qs

Pointers

Pointers

12th Grade

20 Qs

Exam Style Questions

Exam Style Questions

10th - 11th Grade

18 Qs

Google Sheets

Google Sheets

12th Grade

21 Qs

la internet

la internet

3rd - 11th Grade

20 Qs

YAY! Fridate with ComSSA (Network 101)

YAY! Fridate with ComSSA (Network 101)

University

20 Qs

11al网络安全

11al网络安全

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Arasaka Teacher

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

数据隐私

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Keeping data secret and safe so only authorized people can access or use it.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Making sure data is accurate and unchanged by unauthorized people.

4.

DROPDOWN QUESTION

1 min • 1 pt

(a) (a)   of Data Meaning: Keeping data secret and safe so only (b)   people can access or use it.

Example: Your medical records are private—only your doctor should see them.

(b) (c)   of Data Meaning: Making sure data is (d)   and unchanged by unauthorized people. Example: A bank account balance should not be altered by hackers.

Privacy
authorized
Integrity
accurate
Transparency
Public
Inaccuracy

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Fake emails pretending to be from trusted sources (e.g., banks, companies).

Tricks you to share personal info (e.g., passwords, bank details) by clicking links or opening attachments.

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Phishing Email Fake emails pretending to be from ​ (a)   s (e.g., banks, companies). Tricks you to share personal info (e.g., passwords, bank details) by ​ (b)   or opening attachments.

trusted source
clicking links
unknown sender
downloading files
trusted friend

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

恶意软件

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?