
Secure Your Secrets Vocabulary
Authored by Pamela Glasener
Computers
7th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Protecting people’s data and personal information (also called sensitive information).
Privacy
Security
Two-step verification
Password
Encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Protecting people’s devices and the software on them.
Privacy
Security
Two-step verification
Password
Encryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security process where logging in to a service requires two separate steps or two “factors,” such as a password and a one-time code. For example, you may have to enter your password and then enter a code that was texted to your phone or a code from an app.
Privacy
Security
Two-step verification
Password
Encryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A secret combination used to access something. It may take different forms; for example, you may have a four-digit number-only code that you use for your phone lock and a much more complex password for your email account. In general, you should make your passwordsx as long and complex as you can while still being able to remember them.
Privacy
Complexity
Two-step verification
Password
Encryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of converting information or data into a code that makes it unreadable and inaccessible.
Privacy
Complexity
Two-step verification
Password
Encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The goal when creating a secure password. For example, a password is complex when it has a mix of numbers, special characters (like $ or &), and both lowercase and uppercase letters.
Privacy
Complexity
Hacker
Password
Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data.
Privacy
Complexity
Hacker
Password
Encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?