Technoshield

Technoshield

University

10 Qs

quiz-placeholder

Similar activities

SEGi College Engagement with SAINS

SEGi College Engagement with SAINS

University

10 Qs

DifficultRound

DifficultRound

University

5 Qs

Adding Interactive Elements in HTML

Adding Interactive Elements in HTML

12th Grade - University

15 Qs

Keamanan Jaringan Komputer

Keamanan Jaringan Komputer

10th Grade - University

9 Qs

Password Cracking Techniques and Countermeasures Quiz

Password Cracking Techniques and Countermeasures Quiz

University

15 Qs

CLC Unit 2 Lesson 1,2,3 and 4 Quiz

CLC Unit 2 Lesson 1,2,3 and 4 Quiz

University

12 Qs

Chapter 8 Quiz II

Chapter 8 Quiz II

University

10 Qs

Technoshield

Technoshield

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

AHMAD SHAQIL NAJIY BIN AHMAD MAHMUD .

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a privacy concern?

Accuracy

Property

Encryption

Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which example describes a "data broker"?

A bank officer approving your loan

A company selling your purchase history to marketers

A hacker stealing your password

A friend sharing your contact number without permission

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Once information is posted on social media, it is no longer _______?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which is a common sign of a rouge Wi-Fi hotspot?

It asks you to create a strong password

It has a similar name to a legit hotspot

It requires biometric login

It is only available in secure government buildings

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is NOT a type of malware?

Ransomeware

Phishing

Spyware

Trojan Horse

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Before entering the login details, check the website's ______ and verify

the security phrase / image

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A DDoS attack uses:

A computer flooding the target with traffic

Many devices in a botnet flooding the target

Malware that steals credit card details

Fake websites to capture login credentials

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?