
Ch6 : Risk to Data and Personal Information
Presentation
•
Computers
•
10th Grade
•
Practice Problem
•
Easy
Ala Jaber
Used 5+ times
FREE Resource
42 Slides • 68 Questions
1
2
3
4
5
Multiple Choice
What should you do if someone you don't know asks for your password online?
Tell them your password because they asked nicely.
Keep your password a secret and tell a trusted adult.
Write your password in an email and send it to them.
Share your password only if they promise to be your friend.
6
Multiple Choice
What are the potential risks of operating online for individuals and organizations?
Increased privacy
Cybersecurity threats
Enhanced communication
Greater access to information
7
Multiple Choice
What are some risks associated with transmitting and storing data digitally?
Identity theft
Data encryption
Data backup
Data recovery
8
Multiple Choice
What are the risks to data and information that one should be aware of?
Unauthorized access
Accidental deletion
Phishing
All of the above
9
10
Multiple Choice
What is the amount of emails sent every second?
2.9 million
50 million
700 billion
24 petabytes
11
12
Multiple Choice
What is the term used for access to networks by users who are not permitted to access them?
Unauthorized access
Malware
Botnets
Financial data
13
Multiple Choice
Why might attackers use malware to create a botnet?
A. To improve network speed
B. To protect devices from viruses
C. To use infected computers for harmful activities
D. To store financial data securely
14
Multiple Choice
How might an unauthorised user attempt to gain access to a network with poor security?
A. By installing antivirus software
B. By manually approving login requests
C. By running software that tries many login details per second
D. By encrypting network data
15
16
17
Multiple Choice
Which of the following is an example of deliberate damage caused by malware?
A. Improving system performance
B. Backing up user files automatically
C. Deleting files or reprogramming a system to cause harm
D. Updating software securely
18
Multiple Choice
What is the impact of Stuxnet malware on nuclear facilities in Iran?
It caused physical damage to the facilities
It had no impact
It improved security measures
It was a harmless software
19
Multiple Choice
What is the main purpose of ransomware?
A. To protect files using encryption for free
B. To threaten users into paying money to regain access to files or systems
C. To speed up computer processing
D. To remove malware from infected devices
20
21
Multiple Select
What are some common causes of accidental deletion of files?
Pressing a key on a keyboard by accident
Formatting media on the wrong storage device
Device losing power unexpectedly
22
Multiple Choice
What is the main difference between an incremental backup and a differential backup?
An incremental backup stores all files changed since the last full backup, while a differential backup stores only the files changed since the last incremental backup.
An incremental backup stores only the files changed since the last backup of any type, while a differential backup stores all files changed since the last full backup.
An incremental backup requires more storage space than a differential backup.
A differential backup is faster to restore than an incremental backup.
23
Multiple Choice
In the context of data recovery, what is the primary advantage of a full backup?
It takes the least time to restore.
It consumes the least amount of storage space.
It captures system settings and application data.
It only backs up files that have changed since the last backup.
24
25
26
Multiple Choice
What is phishing?
A. A method of protecting personal data online
B. A criminal technique used to trick users into giving personal information
C. A type of antivirus software
D. A secure way to send emails
27
Multiple Choice
How do phishing attacks commonly try to obtain personal details from users?
A. By sending messages that appear to be from trusted organisations
B. By installing hardware devices on computers
C. By blocking access to the internet
D. By improving website security
28
Multiple Choice
What is the main purpose of the email from Mukhtar Hassan?
To offer a job opportunity
To seek funding for a client
To provide financial advice
To request personal information
29
30
Multiple Choice
What is spear phishing?
A type of phishing targeting individuals
A general phishing technique
A method of online shopping
A type of email marketing
31
32
33
Multiple Choice
Which one of the following statements is incorrect about pharming ?
A technique to gain personal information
A method to redirect internet traffic
A way to create fake websites
Blocking malicious software
34
Multiple Choice
What should users always check to ensure they are not visiting fake websites?
The website's design
The URL of the website
The website's color scheme
The website's loading speed
35
Multiple Choice
How can criminals carry out a pharming attack?
A. By changing DNS settings or using malware
B. By sending harmless emails
C. By installing security patches
D. By improving website design
36
37
Multiple Choice
Imagine Aria and David have set up a small office network. What is the primary function of a firewall they installed to protect their network?
To increase internet speed.
To serve as a physical barrier against network intrusion.
To monitor and control incoming and outgoing network traffic based on predetermined security rules.
To detect and remove viruses and other malware.
38
Multiple Choice
What is the main role of a firewall?
A. To store personal data
B. To control data entering and leaving a network
C. To speed up internet connections
D. To remove viruses from files
39
Multiple Choice
How does a firewall decide whether data should be allowed through a network?
A. By checking usernames only
B. By comparing data to a set of rules
C. By encrypting all network traffic
D. By blocking all incoming data
40
Multiple Choice
Who is usually responsible for changing the rules used by a firewall?
A. The internet service provider
B. The network administrator
C. The computer manufacturer
D. The website owner
41
42
Multiple Choice
What is the purpose of encryption in data security?
To make data readable
To scramble data into an unreadable form
To store data securely
To share data easily
43
Match
Match the following vocab word with its definition.
Digital Footprint
Virtual Private Network (VPN)
Multi-factor Authentication
Firewall
Encryption
trail of data you leave on the internet
private network with data encryption
method of verifying identity
prevents unauthorized access to data
a conversion of something into a code
trail of data you leave on the internet
private network with data encryption
method of verifying identity
prevents unauthorized access to data
a conversion of something into a code
44
45
Multiple Select
Check off all the ways you can make a stronger password:
Make it longer than 8 characters
Use mixed sets of characters
Keep it easy to spell
Use only capitals or lowercase
46
Multiple Choice
Which password would be considered most secure?
A. password123
B. John2009
C. Q7#rA9!kP
D. 12345678
47
Match
Match each password feature to its purpose:
Increases resistance to brute-force attacks
Makes passwords harder to guess
Prevents others from seeing it on screen
More than eight characters
Random characters
Masked password
More than eight characters
Random characters
Masked password
48
Match
Match the following
the identification of a user based on what a person knows
scrambles information into an alternative form that requires a key or password to decrypt
small electronic devices with imbedded chips that can store information and can act as an identification instrument.
Hardware and/or software that guards a private network by analyzing incomming and outgoing information for appropriate markings.
passwords
encryption
smart card
firewall
passwords
encryption
smart card
firewall
49
50
Multiple Choice
Why is it not recommended to use the same password for multiple websites?
A. It makes logging in faster and easier
B. If one account is hacked, other accounts are also at risk
C. It prevents network operating systems from working
D. It allows websites to store passwords securely
51
52
53
Multiple Choice
What does CAPTCHA stand for?
Completely Automated Public Turing Test to Tell Computers and Humans Apart
Computer Automated Public Turing Test to Tell Computers and Humans Apart
Completely Automated Public Test to Tell Computers and Humans Apart
Computer Automated Public Test to Tell Computers and Humans Apart
54
55
Multiple Choice
What is the purpose of reCAPTCHA tests as described in the images?
To verify human users
To collect personal data
To improve website speed
To block spam
56
57
Multiple Choice
What is the main purpose of anti-malware software?
A. To spread viruses across networks
B. To prevent malware from accessing or operating on a computer
C. To create virus definitions
D. To quarantine email attachments
58
Multiple Choice
What happens when anti-virus software finds a file that matches a virus definition?
A. The file is deleted immediately
B. The file is allowed to run
C. The file is quarantined so it cannot be run
D. The computer shuts down
59
Match
Match each term to its correct description
Processing data instantly as it is input
Malware that spreads using networks
Isolates a suspicious file so it cannot harm other files
Sequences of code used to identify viruses
Real time
Virus
Quarantine
Virus definitions
Real time
Virus
Quarantine
Virus definitions
60
61
Multiple Choice
What is the main reason anti-virus software needs to be updated regularly?
To improve user interface
To combat evolving virus threats
To increase software speed
To reduce storage space
62
Multiple Choice
Why must anti-virus software be updated regularly?
A. To reduce computer processing speed
B. Because virus code can change over time
C. To allow viruses to spread automatically
D. Because email software requires updates
63
64
Multiple Choice
A program installed to collect information about users, their systems or browsing habits, keys that are typed, sending the data to a remote user.
Virus
Adware
Denial of Service
Spyware
65
Multiple Choice
What is cybersecurity?
the state of being protected against the criminal or unauthorized use of electronic data,
Security against breaking into your house
Top secret Government security
66
Match
Match each term to the correct description
Detects and removes computer viruses
Displays unwanted adverts to users
Monitors and records user data secretly
Detects, quarantines and removes spyware
It is combined with software that protects against adware and spyware
Anti-adware software
Adware
Spyware
Anti-spyware software
anti-malware
Anti-adware software
Adware
Spyware
Anti-spyware software
anti-malware
67
68
Multiple Choice
What is the purpose of file permissions?
A. To control how fast files are opened
B. To authorise user access to files, folders, or drives
C. To protect files from viruses
D. To encrypt data automatically
69
Multiple Choice
What are the types of access permissions that can be set for files, folders, or drives?
Read only
Write only
Read and write
No access
70
71
Multiple Choice
Why was HTTPS developed to replace HTTP for secure websites?
A. HTTP is slower than HTTPS
B. HTTP cannot display web pages
C. Data transferred using HTTP is not secure
D. HTTP does not work with web servers
72
Drag and Drop
73
74
Multiple Choice
How do most web browsers show that a website is using HTTPS and is secure?
A. By displaying a warning message
B. By showing a green padlock in the address bar
C. By blocking access to the website
D. By changing the website’s background colour
75
Dropdown
76
77
Multiple Choice
Which type of email attachment should users be especially careful when opening?
A. A PDF document
B. An image file (.jpg)
C. A text file (.txt)
D. An executable file such as a .exe or .zip
78
Match
Match each term or warning sign to its correct description
Using the mouse to see a link’s URL without clicking
A file that can be run as a program
Tries to pressure the user to act immediately
Hover over
Executable file
Urgent message
Hover over
Executable file
Urgent message
79
80
Multiple Choice
Why are backups used when storing data?
A. To increase internet speed
B. To make files load faster
C. To keep data safe if the original storage is damaged, lost, or stolen
D. To reduce the size of files
81
Match
Match each cause to how data loss or damage may occur
Files are destroyed by malicious software
Storage device is taken without permission
Physical damage caused by natural disasters
Sudden loss of electricity causing file corruption
Malware
theft
Flooding or fire
Power cuts
Malware
theft
Flooding or fire
Power cuts
82
83
Multiple Choice
Why should backups be scheduled for late in the evening?
A. To reduce the cost of storage
B. To make backups faster
C. To avoid conflicts while users are accessing data
D. To prevent malware attacks
84
Match
Match each type of backup to its correct description
Saves only files changed since the last full or incremental backup
Creates a copy of all files
Copies files changed since the last full backup
Incremental backup
Full backup
Differential backup
Incremental backup
Full backup
Differential backup
85
86
87
88
Multiple Choice
What is the main function of an online payment system?
A. To store money on a mobile phone
B. To send payment details across networks to computers that process payments
C. To replace banks completely
D. To prevent users from using cash
89
Multiple Choice
What is meant by a cashless society?
A. A society where banks no longer exist
B. A society where people only use credit cards
C. A society where people pay for goods and services using methods other than cash
D. A society where cash payments are illegal
90
91
Multiple Choice
What is the main role of an online third-party payment processor such as PayPal or Skrill?
A. To deliver physical goods to customers
B. To authorise financial transactions on behalf of users
C. To replace online shopping websites
D. To store cash for customers
92
93
Multiple Choice
Which information is usually required when paying online using a bank card?
A. Cardholder’s home address
B. Card number, expiry date, name on the card, and security code
C. Bank branch name
D. Account balance
94
Multiple Choice
Which detail is required when making an online payment using a bank card?
A. The card expiry date
B. The customer’s billing history
C. The bank’s sort code
D. The shop’s payment reference
95
Multiple Choice
What does the term expiry date mean when used on a bank card?
A. The date the card was issued
B. The date the payment was made
C. The date the card details were last updated
D. The date after which the card can no longer be used
96
97
Multiple Choice
What is another name for the card security code printed on a bank card?
A. Card Verification Code (CVC or CVV)
B. Personal Identification Number (PIN)
C. Bank account number
D. Sort code
98
Multiple Choice
Why might a user be asked to enter a password when paying online with a bank card?
A. To create a new bank account
B. To confirm the delivery address
C. To check the card balance
D. To authenticate the payment using a secure system
99
100
Multiple Choice
Why is there a maximum limit on contactless card payments?
A. To reduce the speed of payments
B. To stop cards working without a PIN
C. To prevent card readers from scanning cards
D. To limit how much money can be stolen if fraud occurs
101
Multiple Choice
What is the main purpose of Near Field Communication (NFC) in contactless cards?
A. To allow payment data to be transferred wirelessly over a short distance
B. To store a user’s PIN number
C. To connect the card to the internet
D. To verify a user’s identity with a password
102
103
Multiple Choice
Why might criminals be able to steal money using NFC-enabled devices?
A. Because card readers or apps can intercept the weak NFC signal at short range
B. Because NFC cards store a visible PIN
C. Because NFC cards connect directly to the internet
D. Because contactless cards have no security features
104
Multiple Choice
How can users reduce the risk of NFC card details being intercepted?
A. By increasing the contactless payment limit
B. By disabling online banking
C. By changing the card expiry date
D. By wrapping the card in foil to block the NFC signal
105
Multiple Choice
What technology does NFC stand for?
Near-Field Communication
Network Frequency Control
New Form Connectivity
None of the above
106
107
108
109
110
Poll
How confident do you feel about this topic now?
Show answer
Auto Play
Slide 1 / 110
SLIDE
Similar Resources on Wayground
106 questions
IB - 3.1. - SOURCES OF FINANCE
Presentation
•
11th - 12th Grade
106 questions
T2.C3.1 | Culture and Communication | Introduction
Presentation
•
11th Grade
108 questions
Civics Chapter 7
Presentation
•
10th Grade
106 questions
PRESABER FINAL - QUÍMICA 10°
Presentation
•
11th Grade
106 questions
WELCOME TO ELD
Presentation
•
11th Grade
102 questions
Simple Past - To be
Presentation
•
9th Grade
105 questions
TRANSPORT IN HUMANS (BLOOD CIRCULATORY SYSTEM)
Presentation
•
9th - 12th Grade
103 questions
Ecology Unit Test Prep
Presentation
•
9th - 10th Grade
Popular Resources on Wayground
10 questions
5.P.1.3 Distance/Time Graphs
Quiz
•
5th Grade
10 questions
Fire Drill
Quiz
•
2nd - 5th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
15 questions
Hargrett House Quiz: Community & Service
Quiz
•
5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade