Cybersecurity

Cybersecurity

10th - 12th Grade

22 Qs

quiz-placeholder

Similar activities

Adobe Flash Professional

Adobe Flash Professional

11th Grade

20 Qs

DaLe

DaLe

10th Grade

20 Qs

Python Basic II

Python Basic II

11th Grade - University

20 Qs

Circuito Electrico

Circuito Electrico

3rd - 10th Grade

20 Qs

Modern Technologies - BTEC ICT

Modern Technologies - BTEC ICT

9th - 10th Grade

20 Qs

Sistem Pengapian Konvensional

Sistem Pengapian Konvensional

11th Grade

20 Qs

REUQISITOS DEL SOFTWARE

REUQISITOS DEL SOFTWARE

10th Grade

20 Qs

KIEM TRA 15 PHUT -CN11

KIEM TRA 15 PHUT -CN11

9th - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Instructional Technology

10th - 12th Grade

Medium

Created by

Maria Morrell

Used 514+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A strong password shouldn't contain :

Capital and small letters

Common marks /? ().......

Numbers

personal data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form is for Biometrics

It is a known and registered physical attribute of a user specifically used for verifying their identity

is used for accessing systems. It makes it more difficult for hackers to access accounts as they have long credentials

It’s a security system that needs more than one method of authentication

A one-time pin or password is used in processing online transactions through which they verify their identity

This authentication needs two different signals from two different channels or networks. It prevents most of the attacks from hacking and identity thefts in online banking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following practices can prevent phishing, one of them can't? What is it?

Use firewalls on your networks and systems

Maintain adequate security

Build a denial of service response plan

Use two-factor authentication wherever possible

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are cyber vulnerabilities unlikely to ever go away?

The government won't allow people to fix them.

Criminals need them ti steal identities.

They are side effects of the freedom and ease of communicating online.

They're protected in a secret base on the moon.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do hackers hack?

To make discoveries

To protect information

To steal information and money

To expose corruption

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is regularly used to secure online communication?

Caesar cipher

Public-key encryption

Morse code

Enigma code

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you tell if a website encrypts its traffic?

Google it

Look for a lock symbol in a URL

All websites encrypt their traffic

Encrypted sites take longer to load

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?