IT and Data Security

IT and Data Security

5th - 11th Grade

12 Qs

quiz-placeholder

Similar activities

GWSC 10 HPE Dimensions of Health

GWSC 10 HPE Dimensions of Health

8th - 10th Grade

14 Qs

How Well Do You Know Anime? Take this Quiz To Find Out!

How Well Do You Know Anime? Take this Quiz To Find Out!

6th - 8th Grade

15 Qs

CH. 4 Plate Tectonics

CH. 4 Plate Tectonics

6th Grade

16 Qs

EmTech Q1 Pre-Test 1

EmTech Q1 Pre-Test 1

11th Grade

10 Qs

บทที่ 10 จรรยาบรรณในการใช้ภาษาไทยเชิงวิชาชีพ

บทที่ 10 จรรยาบรรณในการใช้ภาษาไทยเชิงวิชาชีพ

10th - 12th Grade

10 Qs

Module 1: What I know

Module 1: What I know

11th Grade

15 Qs

Squid Game

Squid Game

10th - 12th Grade

10 Qs

IT and Data Security

IT and Data Security

Assessment

Quiz

Other

5th - 11th Grade

Practice Problem

Medium

Created by

Jason Mongo

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Attackers can gain access to your device through an unsecured network.

True

False

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

I should always click on links in emails to check if the website is legitimate.

True

False

Answer explanation

If the link is compromised, by clicking the link you have already allowed access to whatever was planted on the site.

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

By using a complex password (mixture of letters, numbers and symbols), it is impossible for hackers to break through

True

False

Answer explanation

No password is impossible to crack. It just takes longer.

passw0rD - 16min at most

$j7%#n@qTY - 609 years at most

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Attackers can use a combination of attacks E.g. Phishing > Malware > DOS

True

False

Answer explanation

A combination of attacks is usually used to increase the chances of a successful penetration of the system and decreases the chances of early detection.

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is safe to plug in any device to your computer, as long as you have used it before

True

False

Answer explanation

Even if the device is being used before, there is a chance it may already have been infected or compromised. The malware within just has not been activated yet.

6.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of the following is caused by a cyber attack?

Loss of personal data

System Disabled

Forgetting your password

Manipulation of Information

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a form of cyber attack?

Illegal Gatherings

Phishing

Fishing

Search & Arrest

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?