GDPR and Cybersecurity Assessment

GDPR and Cybersecurity Assessment

University - Professional Development

6 Qs

quiz-placeholder

Similar activities

Cluster Day

Cluster Day

Professional Development

10 Qs

GDPR and data protection

GDPR and data protection

Professional Development

9 Qs

syllabus quiz

syllabus quiz

University

11 Qs

Network Security

Network Security

University

11 Qs

Decision Making

Decision Making

KG - University

10 Qs

CCP-101 Week 1 Quiz

CCP-101 Week 1 Quiz

Professional Development

10 Qs

OOTG Cyber Security Quiz

OOTG Cyber Security Quiz

University

10 Qs

IT: Technical/Computer Terms Quiz #40

IT: Technical/Computer Terms Quiz #40

11th Grade - University

10 Qs

GDPR and Cybersecurity Assessment

GDPR and Cybersecurity Assessment

Assessment

Quiz

Other

University - Professional Development

Medium

Created by

Ana Leal

Used 4+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data subject?

Any individual person who can be identified, directly or indirectly, via an identifier such as a name.

Any individual who uses a computer in the European Union.

Who determines the purposes for which and the means by which personal data is processed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not personal data?

Your citizen number

Employers Web Address

Your Home Address

Your IP Address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can you share with co-workers?

Your passwords

Print Screens with Personal Data they don’t need to see

Links for your ClickUp tasks

Personal data of other co-workers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the BAD cybersecurity practice

Keep your software up to date

Use 2FA when possible

Use the same password on different accounts

Don’t use public Wifi

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are phishing emails?

Type of online scam where criminals impersonate legitimate organisations via email.

Type of malicious code or software that looks legitimate but can take control of your computer.

Any of the various methods used to maliciously authenticate into password-protected accounts.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

What would you do if you receive this email?