IDAC Unit 2 Quiz (Part 2)

IDAC Unit 2 Quiz (Part 2)

1st - 5th Grade

10 Qs

quiz-placeholder

Similar activities

Cuento 2 semana 6

Cuento 2 semana 6

3rd Grade

6 Qs

3 ESP 2nd Trim REVIEWER

3 ESP 2nd Trim REVIEWER

3rd Grade

12 Qs

Unit 2: PAVEMENT MATERIALS

Unit 2: PAVEMENT MATERIALS

1st - 10th Grade

10 Qs

Mobile Computing Security

Mobile Computing Security

1st Grade

10 Qs

Grade 3 Computer Review

Grade 3 Computer Review

3rd Grade

10 Qs

Gobierno escolar 2.

Gobierno escolar 2.

1st Grade

10 Qs

Quiz no. 1 Filipino 5

Quiz no. 1 Filipino 5

4th - 6th Grade

15 Qs

Inclusión de enunciados

Inclusión de enunciados

1st - 12th Grade

10 Qs

IDAC Unit 2 Quiz (Part 2)

IDAC Unit 2 Quiz (Part 2)

Assessment

Quiz

Education

1st - 5th Grade

Practice Problem

Medium

Created by

Joel Zhou

Used 28+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The most common form of off-site backup is the ....

CD backup

Thumbdrive backup

Cloud backup

Hard-disk backup

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method to make your digital footprint more secure online.

Using incognito mode

Using a virtual private network

Keeping software up to date

Posting photos on social media freely

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Enforcing strong credentials and multi-factor authentication can help to prevent a data breach.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a data breach, the following steps must be taken EXCEPT ...

Determine what data was stolen

Instruct employees to always maintain their current passwords

Report incident to the cyber security enforcement authorities

Get confirmation of the breach and whether information was exposed

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malware that is self-replicating and spreads without end-user action, causing real devastation is called a .....

Worm

Virus

Trojan

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware tends to expose users to unwanted and potentially harmful advertising?

Virus

Ransomware

Adware

Trojan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Off-site online backup is a method of backing up data to a LOCAL Server.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?