IT and Data Security

IT and Data Security

5th - 11th Grade

12 Qs

quiz-placeholder

Similar activities

Truy tìm dấu vết lừa đảo

Truy tìm dấu vết lừa đảo

9th - 12th Grade

17 Qs

Animal Mimics

Animal Mimics

1st - 5th Grade

10 Qs

Logo Bash-Dash!

Logo Bash-Dash!

KG - Professional Development

11 Qs

roblox quizz

roblox quizz

2nd - 6th Grade

11 Qs

Saint Seiya Quiz

Saint Seiya Quiz

KG - Professional Development

10 Qs

SPY NINJA QUIZ

SPY NINJA QUIZ

1st Grade - Professional Development

8 Qs

Rocketry

Rocketry

6th - 7th Grade

10 Qs

Sonic Quiz

Sonic Quiz

7th Grade

14 Qs

IT and Data Security

IT and Data Security

Assessment

Quiz

Other

5th - 11th Grade

Practice Problem

Medium

Created by

Jason Mongo

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Attackers can gain access to your device through an unsecured network.

True

False

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

I should always click on links in emails to check if the website is legitimate.

True

False

Answer explanation

If the link is compromised, by clicking the link you have already allowed access to whatever was planted on the site.

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

By using a complex password (mixture of letters, numbers and symbols), it is impossible for hackers to break through

True

False

Answer explanation

No password is impossible to crack. It just takes longer.

passw0rD - 16min at most

$j7%#n@qTY - 609 years at most

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Attackers can use a combination of attacks E.g. Phishing > Malware > DOS

True

False

Answer explanation

A combination of attacks is usually used to increase the chances of a successful penetration of the system and decreases the chances of early detection.

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is safe to plug in any device to your computer, as long as you have used it before

True

False

Answer explanation

Even if the device is being used before, there is a chance it may already have been infected or compromised. The malware within just has not been activated yet.

6.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of the following is caused by a cyber attack?

Loss of personal data

System Disabled

Forgetting your password

Manipulation of Information

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a form of cyber attack?

Illegal Gatherings

Phishing

Fishing

Search & Arrest

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?