GDPR and Cybersecurity Assessment

GDPR and Cybersecurity Assessment

University - Professional Development

6 Qs

quiz-placeholder

Similar activities

Phishing - Learning Tales

Phishing - Learning Tales

Professional Development

10 Qs

Writing Covering Letters Quiz

Writing Covering Letters Quiz

University

9 Qs

GDPR for H & G Band

GDPR for H & G Band

Professional Development

10 Qs

smart teacher

smart teacher

Professional Development

7 Qs

Time Management

Time Management

University

10 Qs

Advanced Micro Processors

Advanced Micro Processors

Professional Development

10 Qs

Summaries

Summaries

University

8 Qs

Wh- and How questions with be

Wh- and How questions with be

Professional Development

10 Qs

GDPR and Cybersecurity Assessment

GDPR and Cybersecurity Assessment

Assessment

Quiz

Other

University - Professional Development

Medium

Created by

Ana Leal

Used 4+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data subject?

Any individual person who can be identified, directly or indirectly, via an identifier such as a name.

Any individual who uses a computer in the European Union.

Who determines the purposes for which and the means by which personal data is processed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not personal data?

Your citizen number

Employers Web Address

Your Home Address

Your IP Address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can you share with co-workers?

Your passwords

Print Screens with Personal Data they don’t need to see

Links for your ClickUp tasks

Personal data of other co-workers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the BAD cybersecurity practice

Keep your software up to date

Use 2FA when possible

Use the same password on different accounts

Don’t use public Wifi

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are phishing emails?

Type of online scam where criminals impersonate legitimate organisations via email.

Type of malicious code or software that looks legitimate but can take control of your computer.

Any of the various methods used to maliciously authenticate into password-protected accounts.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

What would you do if you receive this email?