E-SAFE SCHOOL- POST QUESTIONAIRE

E-SAFE SCHOOL- POST QUESTIONAIRE

4th Grade

6 Qs

quiz-placeholder

Similar activities

Cybersecurity, Victor Magnusson

Cybersecurity, Victor Magnusson

1st Grade - Professional Development

10 Qs

gggfddfgdfg

gggfddfgdfg

1st - 6th Grade

10 Qs

ic3 gs5 Computing Fundamentals

ic3 gs5 Computing Fundamentals

4th - 6th Grade

11 Qs

Basics on Google Docs

Basics on Google Docs

1st - 5th Grade

8 Qs

Sangfor VDI partner training - B

Sangfor VDI partner training - B

1st - 10th Grade

10 Qs

OUR ONLINE DIGITAL TRACKS

OUR ONLINE DIGITAL TRACKS

4th Grade

8 Qs

Acceptable Use Policy on Technology

Acceptable Use Policy on Technology

2nd - 5th Grade

10 Qs

MiD-TeRm Test

MiD-TeRm Test

4th Grade

11 Qs

E-SAFE SCHOOL- POST QUESTIONAIRE

E-SAFE SCHOOL- POST QUESTIONAIRE

Assessment

Quiz

Instructional Technology

4th Grade

Hard

Created by

USHA ABRAHAM

Used 6+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The responsible rules and behaviours designed to keep individuals safe whenever connected to the Internet is the definition of

· Cyber Security

· Cyber Ethics

· Cyber Safety

· Cyber Space

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is appropriate to post?

· A picture of something involving an address

· Your location

· A picture of your dog

· Your phone number

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a benefit of

BYOD?

· Reduced costs.

· Viruses and security issues.

· Familiarity.

· Ownership.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should an effective

security policy include?

· An overview of corporate and IT goals and objectives.

· A complete list of mobile devices allowed within the organization.

· Definitions of what information is sensitive and who should have access to it.

· A detailed description of VPN operations and support procedures.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. What does the acronym AUP stand for?

· Acceptable User Practices

· Accountable User Policies

· Allowed User Practices

· Acceptable Use Policy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name would you give to an email attachment that may harm your computer?

· Phishing

· Spam

· Malware