Protecting Personal Data and Cyber Hygiene Practices

Protecting Personal Data and Cyber Hygiene Practices

University

6 Qs

quiz-placeholder

Similar activities

How Cyber Safe Are You?

How Cyber Safe Are You?

University

10 Qs

digital security and privacy

digital security and privacy

University

8 Qs

Basics of Network and Internet Safety

Basics of Network and Internet Safety

10th Grade - University

10 Qs

How to Use and Set Up Multi-Factor Authentication (MFA)

How to Use and Set Up Multi-Factor Authentication (MFA)

University

10 Qs

Data Management and Storage

Data Management and Storage

University

10 Qs

QUIZ-1 KELAS XI

QUIZ-1 KELAS XI

University

10 Qs

Exploring AI in Our World

Exploring AI in Our World

5th Grade - University

10 Qs

12 CND M2 Administrative Network Security

12 CND M2 Administrative Network Security

University

5 Qs

Protecting Personal Data and Cyber Hygiene Practices

Protecting Personal Data and Cyber Hygiene Practices

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Mae Mae

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most effective way to create and manage strong passwords?

Use simple phrases like "password123" for easy recall.

Reuse the same password across multiple accounts.

Use a mix of uppercase letters, numbers, and symbols, and store them in a password manager.

Write passwords on a sticky note attached to your monitor.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method provides the highest security for two-factor authentication (2FA)?

SMS-based codes.

Authentication apps like Google Authenticator.

Security questions about your pet’s name.

Skipping 2FA for convenience.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is regular software updating critical for cyber hygiene?

It improves device battery life.

It installs security patches to fix vulnerabilities.

It changes your IP address.

It increases internet speed.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How should you respond to an email requesting sensitive information?

Reply immediately with the details.

Click links to verify the sender’s website.

Contact the sender through a trusted channel to confirm legitimacy.

Forward the email to colleagues for advice.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best practice for protecting sensitive data?

Store it exclusively on unencrypted USB drives.

Encrypt it both in transit and at rest.

Share it publicly on social media.

Disable firewall settings for faster access.

6.

OPEN ENDED QUESTION

3 mins • 5 pts

Explain how basic cyber hygiene practices (e.g., strong passwords, software updates) contribute to preventing data breaches. Provide examples.

Evaluate responses using AI:

OFF