Search Header Logo
Ch6 : Risk to Data and Personal Information

Ch6 : Risk to Data and Personal Information

Assessment

Presentation

Computers

10th Grade

Practice Problem

Easy

Created by

Ala Jaber

Used 5+ times

FREE Resource

42 Slides • 68 Questions

1

media

2

media

3

media

4

media

5

Multiple Choice

Question image

What should you do if someone you don't know asks for your password online?

1

Tell them your password because they asked nicely.

2

Keep your password a secret and tell a trusted adult.

3

Write your password in an email and send it to them.

4

Share your password only if they promise to be your friend.

6

Multiple Choice

What are the potential risks of operating online for individuals and organizations?

1

Increased privacy

2

Cybersecurity threats

3

Enhanced communication

4

Greater access to information

7

Multiple Choice

What are some risks associated with transmitting and storing data digitally?

1

Identity theft

2

Data encryption

3

Data backup

4

Data recovery

8

Multiple Choice

What are the risks to data and information that one should be aware of?

1

Unauthorized access

2

Accidental deletion

3

Phishing

4

All of the above

9

media

10

Multiple Choice

What is the amount of emails sent every second?

1

2.9 million

2

50 million

3

700 billion

4

24 petabytes

11

media

12

Multiple Choice

What is the term used for access to networks by users who are not permitted to access them?

1

Unauthorized access

2

Malware

3

Botnets

4

Financial data

13

Multiple Choice

Why might attackers use malware to create a botnet?

1

A. To improve network speed

2

B. To protect devices from viruses

3

C. To use infected computers for harmful activities

4

D. To store financial data securely

14

Multiple Choice

How might an unauthorised user attempt to gain access to a network with poor security?

1

A. By installing antivirus software

2

B. By manually approving login requests

3

C. By running software that tries many login details per second

4

D. By encrypting network data

15

media

16

media

17

Multiple Choice

Which of the following is an example of deliberate damage caused by malware?

1

A. Improving system performance

2

B. Backing up user files automatically

3

C. Deleting files or reprogramming a system to cause harm

4

D. Updating software securely

18

Multiple Choice

What is the impact of Stuxnet malware on nuclear facilities in Iran?

1

It caused physical damage to the facilities

2

It had no impact

3

It improved security measures

4

It was a harmless software

19

Multiple Choice

What is the main purpose of ransomware?

1

A. To protect files using encryption for free

2

B. To threaten users into paying money to regain access to files or systems

3

C. To speed up computer processing

4

D. To remove malware from infected devices

20

media

21

Multiple Select

What are some common causes of accidental deletion of files?

1

Pressing a key on a keyboard by accident

2

Formatting media on the wrong storage device

3

Device losing power unexpectedly

22

Multiple Choice

What is the main difference between an incremental backup and a differential backup?

1

An incremental backup stores all files changed since the last full backup, while a differential backup stores only the files changed since the last incremental backup.

2

An incremental backup stores only the files changed since the last backup of any type, while a differential backup stores all files changed since the last full backup.

3

An incremental backup requires more storage space than a differential backup.

4

A differential backup is faster to restore than an incremental backup.

23

Multiple Choice

In the context of data recovery, what is the primary advantage of a full backup?

1

It takes the least time to restore.

2

It consumes the least amount of storage space.

3

It captures system settings and application data.

4

It only backs up files that have changed since the last backup.

24

media

25

media

26

Multiple Choice

What is phishing?

1

A. A method of protecting personal data online

2

B. A criminal technique used to trick users into giving personal information

3

C. A type of antivirus software

4

D. A secure way to send emails

27

Multiple Choice

How do phishing attacks commonly try to obtain personal details from users?

1

A. By sending messages that appear to be from trusted organisations

2

B. By installing hardware devices on computers

3

C. By blocking access to the internet

4

D. By improving website security

28

Multiple Choice

What is the main purpose of the email from Mukhtar Hassan?

1

To offer a job opportunity

2

To seek funding for a client

3

To provide financial advice

4

To request personal information

29

media

30

Multiple Choice

What is spear phishing?

1

A type of phishing targeting individuals

2

A general phishing technique

3

A method of online shopping

4

A type of email marketing

31

media

32

media

33

Multiple Choice

Which one of the following statements is incorrect about pharming ?

1

A technique to gain personal information

2

A method to redirect internet traffic

3

A way to create fake websites

4

Blocking malicious software

34

Multiple Choice

What should users always check to ensure they are not visiting fake websites?

1

The website's design

2

The URL of the website

3

The website's color scheme

4

The website's loading speed

35

Multiple Choice

How can criminals carry out a pharming attack?

1

A. By changing DNS settings or using malware

2

B. By sending harmless emails

3

C. By installing security patches

4

D. By improving website design

36

media

37

Multiple Choice

Question image

Imagine Aria and David have set up a small office network. What is the primary function of a firewall they installed to protect their network?

1

To increase internet speed.

2

To serve as a physical barrier against network intrusion.

3

To monitor and control incoming and outgoing network traffic based on predetermined security rules.

4

To detect and remove viruses and other malware.

38

Multiple Choice

What is the main role of a firewall?

1

A. To store personal data

2

B. To control data entering and leaving a network

3

C. To speed up internet connections

4

D. To remove viruses from files

39

Multiple Choice

How does a firewall decide whether data should be allowed through a network?

1

A. By checking usernames only

2

B. By comparing data to a set of rules

3

C. By encrypting all network traffic

4

D. By blocking all incoming data

40

Multiple Choice

Who is usually responsible for changing the rules used by a firewall?

1

A. The internet service provider

2

B. The network administrator

3

C. The computer manufacturer

4

D. The website owner

41

media

42

Multiple Choice

What is the purpose of encryption in data security?

1

To make data readable

2

To scramble data into an unreadable form

3

To store data securely

4

To share data easily

43

Match

Match the following vocab word with its definition.

Digital Footprint

Virtual Private Network (VPN)

Multi-factor Authentication

Firewall

Encryption

trail of data you leave on the internet

private network with data encryption

method of verifying identity

prevents unauthorized access to data

a conversion of something into a code

44

media

45

Multiple Select

Question image

Check off all the ways you can make a stronger password:

1

Make it longer than 8 characters

2

Use mixed sets of characters

3

Keep it easy to spell

4

Use only capitals or lowercase

46

Multiple Choice

Which password would be considered most secure?

1

A. password123

2

B. John2009

3

C. Q7#rA9!kP

4

D. 12345678

47

Match

Match each password feature to its purpose:

Increases resistance to brute-force attacks

Makes passwords harder to guess

Prevents others from seeing it on screen

More than eight characters

Random characters

Masked password

48

Match

Match the following

the identification of a user based on what a person knows

scrambles information into an alternative form that requires a key or password to decrypt

small electronic devices with imbedded chips that can store information and can act as an identification instrument.

Hardware and/or software that guards a private network by analyzing incomming and outgoing information for appropriate markings.

passwords

encryption

smart card

firewall

49

media

50

Multiple Choice

Why is it not recommended to use the same password for multiple websites?

1

A. It makes logging in faster and easier

2

B. If one account is hacked, other accounts are also at risk

3

C. It prevents network operating systems from working

4

D. It allows websites to store passwords securely

51

media

52

media

53

Multiple Choice

What does CAPTCHA stand for?

1

Completely Automated Public Turing Test to Tell Computers and Humans Apart

2

Computer Automated Public Turing Test to Tell Computers and Humans Apart

3

Completely Automated Public Test to Tell Computers and Humans Apart

4

Computer Automated Public Test to Tell Computers and Humans Apart

54

media

55

Multiple Choice

What is the purpose of reCAPTCHA tests as described in the images?

1

To verify human users

2

To collect personal data

3

To improve website speed

4

To block spam

56

media

57

Multiple Choice

What is the main purpose of anti-malware software?

1

A. To spread viruses across networks

2

B. To prevent malware from accessing or operating on a computer

3

C. To create virus definitions

4

D. To quarantine email attachments

58

Multiple Choice

What happens when anti-virus software finds a file that matches a virus definition?

1

A. The file is deleted immediately

2

B. The file is allowed to run

3

C. The file is quarantined so it cannot be run

4

D. The computer shuts down

59

Match

Match each term to its correct description

Processing data instantly as it is input

Malware that spreads using networks

Isolates a suspicious file so it cannot harm other files

Sequences of code used to identify viruses

Real time

Virus

Quarantine

Virus definitions

60

media

61

Multiple Choice

What is the main reason anti-virus software needs to be updated regularly?

1

To improve user interface

2

To combat evolving virus threats

3

To increase software speed

4

To reduce storage space

62

Multiple Choice

Why must anti-virus software be updated regularly?

1

A. To reduce computer processing speed

2

B. Because virus code can change over time

3

C. To allow viruses to spread automatically

4

D. Because email software requires updates

63

media

64

Multiple Choice

A program installed to collect information about users, their systems or browsing habits, keys that are typed, sending the data to a remote user.

1

Virus

2

Adware

3

Denial of Service

4

Spyware

65

Multiple Choice

Question image

What is cybersecurity?

1

the state of being protected against the criminal or unauthorized use of electronic data,

2

Security against breaking into your house

3

Top secret Government security

66

Match

Match each term to the correct description

Detects and removes computer viruses

Displays unwanted adverts to users

Monitors and records user data secretly

Detects, quarantines and removes spyware

It is combined with software that protects against adware and spyware

Anti-adware software

Adware

Spyware

Anti-spyware software

anti-malware

67

media

68

Multiple Choice

What is the purpose of file permissions?

1

A. To control how fast files are opened

2

B. To authorise user access to files, folders, or drives

3

C. To protect files from viruses

4

D. To encrypt data automatically

69

Multiple Choice

What are the types of access permissions that can be set for files, folders, or drives?

1

Read only

2

Write only

3

Read and write

4

No access

70

media

71

Multiple Choice

Why was HTTPS developed to replace HTTP for secure websites?

1

A. HTTP is slower than HTTPS

2

B. HTTP cannot display web pages

3

C. Data transferred using HTTP is not secure

4

D. HTTP does not work with web servers

72

Drag and Drop

Encrypts data using SSL or TLS​
Exchanges data without encryption​
Authorises financial transactions​
Drag these tiles and drop them in the correct blank above
HTTPS
HTTP
Payment server

73

media

74

Multiple Choice

How do most web browsers show that a website is using HTTPS and is secure?

1

A. By displaying a warning message

2

B. By showing a green padlock in the address bar

3

C. By blocking access to the website

4

D. By changing the website’s background colour

75

Dropdown

A. A website that is operated legally​
Keeps communications private and secure​
Indicates that a website is secure​

76

media

77

Multiple Choice

Which type of email attachment should users be especially careful when opening?

1

A. A PDF document

2

B. An image file (.jpg)

3

C. A text file (.txt)

4

D. An executable file such as a .exe or .zip

78

Match

Match each term or warning sign to its correct description

Using the mouse to see a link’s URL without clicking

A file that can be run as a program

Tries to pressure the user to act immediately

Hover over

Executable file

Urgent message

79

media

80

Multiple Choice

Why are backups used when storing data?

1

A. To increase internet speed

2

B. To make files load faster

3

C. To keep data safe if the original storage is damaged, lost, or stolen

4

D. To reduce the size of files

81

Match

Match each cause to how data loss or damage may occur

Files are destroyed by malicious software

Storage device is taken without permission

Physical damage caused by natural disasters

Sudden loss of electricity causing file corruption

Malware

theft

Flooding or fire

Power cuts

82

media

83

Multiple Choice

Why should backups be scheduled for late in the evening?

1

A. To reduce the cost of storage

2

B. To make backups faster

3

C. To avoid conflicts while users are accessing data

4

D. To prevent malware attacks

84

Match

Match each type of backup to its correct description

Saves only files changed since the last full or incremental backup

Creates a copy of all files

Copies files changed since the last full backup

Incremental backup

Full backup

Differential backup

85

media

86

media

87

media

88

Multiple Choice

Question image

What is the main function of an online payment system?

1

A. To store money on a mobile phone

2

B. To send payment details across networks to computers that process payments

3

C. To replace banks completely

4

D. To prevent users from using cash

89

Multiple Choice

What is meant by a cashless society?

1

A. A society where banks no longer exist

2

B. A society where people only use credit cards

3

C. A society where people pay for goods and services using methods other than cash

4

D. A society where cash payments are illegal

90

media

91

Multiple Choice

What is the main role of an online third-party payment processor such as PayPal or Skrill?

1

A. To deliver physical goods to customers

2

B. To authorise financial transactions on behalf of users

3

C. To replace online shopping websites

4

D. To store cash for customers

92

media

93

Multiple Choice

Which information is usually required when paying online using a bank card?

1

A. Cardholder’s home address

2

B. Card number, expiry date, name on the card, and security code

3

C. Bank branch name

4

D. Account balance

94

Multiple Choice

Which detail is required when making an online payment using a bank card?

1

A. The card expiry date

2

B. The customer’s billing history

3

C. The bank’s sort code

4

D. The shop’s payment reference

95

Multiple Choice

What does the term expiry date mean when used on a bank card?

1

A. The date the card was issued

2

B. The date the payment was made

3

C. The date the card details were last updated

4

D. The date after which the card can no longer be used

96

media

97

Multiple Choice

Question image

What is another name for the card security code printed on a bank card?

1

A. Card Verification Code (CVC or CVV)

2

B. Personal Identification Number (PIN)

3

C. Bank account number

4

D. Sort code

98

Multiple Choice

Why might a user be asked to enter a password when paying online with a bank card?

1

A. To create a new bank account

2

B. To confirm the delivery address

3

C. To check the card balance

4

D. To authenticate the payment using a secure system

99

media

100

Multiple Choice

Why is there a maximum limit on contactless card payments?

1

A. To reduce the speed of payments

2

B. To stop cards working without a PIN

3

C. To prevent card readers from scanning cards

4

D. To limit how much money can be stolen if fraud occurs

101

Multiple Choice

What is the main purpose of Near Field Communication (NFC) in contactless cards?

1

A. To allow payment data to be transferred wirelessly over a short distance

2

B. To store a user’s PIN number

3

C. To connect the card to the internet

4

D. To verify a user’s identity with a password

102

media

103

Multiple Choice

Why might criminals be able to steal money using NFC-enabled devices?

1

A. Because card readers or apps can intercept the weak NFC signal at short range

2

B. Because NFC cards store a visible PIN

3

C. Because NFC cards connect directly to the internet

4

D. Because contactless cards have no security features

104

Multiple Choice

How can users reduce the risk of NFC card details being intercepted?

1

A. By increasing the contactless payment limit

2

B. By disabling online banking

3

C. By changing the card expiry date

4

D. By wrapping the card in foil to block the NFC signal

105

Multiple Choice

What technology does NFC stand for?

1

Near-Field Communication

2

Network Frequency Control

3

New Form Connectivity

4

None of the above

106

media

107

media

108

media

109

media

110

Poll

How confident do you feel about this topic now?

Very confident
Somewhat confident
Not confident
media

Show answer

Auto Play

Slide 1 / 110

SLIDE