Cybersecurity

Cybersecurity

10th - 12th Grade

22 Qs

quiz-placeholder

Similar activities

Sistemas Operativos 2B.T 2 parcial 2Q

Sistemas Operativos 2B.T 2 parcial 2Q

12th Grade

20 Qs

PORTAL ASEGURAMIENTO

PORTAL ASEGURAMIENTO

1st - 12th Grade

22 Qs

Chapter 11 Carpentry

Chapter 11 Carpentry

9th - 12th Grade

17 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

Base de datos

Base de datos

12th Grade

20 Qs

Evaluacion Arquitectura De Computadores

Evaluacion Arquitectura De Computadores

10th Grade

20 Qs

tecnología segundo

tecnología segundo

1st - 10th Grade

20 Qs

Word

Word

11th Grade

18 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Instructional Technology

10th - 12th Grade

Medium

Created by

Maria Morrell

Used 514+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A strong password shouldn't contain :

Capital and small letters

Common marks /? ().......

Numbers

personal data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form is for Biometrics

It is a known and registered physical attribute of a user specifically used for verifying their identity

is used for accessing systems. It makes it more difficult for hackers to access accounts as they have long credentials

It’s a security system that needs more than one method of authentication

A one-time pin or password is used in processing online transactions through which they verify their identity

This authentication needs two different signals from two different channels or networks. It prevents most of the attacks from hacking and identity thefts in online banking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following practices can prevent phishing, one of them can't? What is it?

Use firewalls on your networks and systems

Maintain adequate security

Build a denial of service response plan

Use two-factor authentication wherever possible

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are cyber vulnerabilities unlikely to ever go away?

The government won't allow people to fix them.

Criminals need them ti steal identities.

They are side effects of the freedom and ease of communicating online.

They're protected in a secret base on the moon.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do hackers hack?

To make discoveries

To protect information

To steal information and money

To expose corruption

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is regularly used to secure online communication?

Caesar cipher

Public-key encryption

Morse code

Enigma code

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you tell if a website encrypts its traffic?

Google it

Look for a lock symbol in a URL

All websites encrypt their traffic

Encrypted sites take longer to load

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Instructional Technology