Search Header Logo

security and ethic 1

Authored by asmali ahmad

Computers

10th Grade

Used 15+ times

security and ethic 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Examples of security risks except

spyware

hacking

phishing

firewall

2.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Hacking isn't necessarily harmful whilst cracking is always illegal and potentially very damaging

True

False

3.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

The act of locating and using wireless internet connection illegally

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

All of these are methods to protect from hackers attack except

install firewall

install anti-virus software

install anti-hacking software

use of strong password

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Examples of anti-virus software except

Norton

Mac Afee

Zoom

Trend Micro

6.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

The creator sends out a legitimate-looking email, but the link/attachment will sent to a fake/bogus website

7.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Delete straight away or do not open any unknown or suspicious email

Agree

Disagree

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?