IT and Data Security

IT and Data Security

5th - 11th Grade

12 Qs

quiz-placeholder

Similar activities

Technology Hex-Technology Terms #1

Technology Hex-Technology Terms #1

7th Grade

12 Qs

NGAF_Training Quiz

NGAF_Training Quiz

KG - Professional Development

10 Qs

Cybercrime Quiz

Cybercrime Quiz

6th - 8th Grade

11 Qs

Wireless Network Security Quiz

Wireless Network Security Quiz

10th Grade

15 Qs

Types of Attacks - Phishing

Types of Attacks - Phishing

9th - 12th Grade

10 Qs

Cyber Safety Quiz

Cyber Safety Quiz

3rd - 6th Grade

10 Qs

Social Engineering Quiz

Social Engineering Quiz

6th - 8th Grade

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

11th Grade

10 Qs

IT and Data Security

IT and Data Security

Assessment

Quiz

Other

5th - 11th Grade

Medium

Created by

Jason Mongo

Used 8+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Attackers can gain access to your device through an unsecured network.

True

False

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

I should always click on links in emails to check if the website is legitimate.

True

False

Answer explanation

If the link is compromised, by clicking the link you have already allowed access to whatever was planted on the site.

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

By using a complex password (mixture of letters, numbers and symbols), it is impossible for hackers to break through

True

False

Answer explanation

No password is impossible to crack. It just takes longer.

passw0rD - 16min at most

$j7%#n@qTY - 609 years at most

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Attackers can use a combination of attacks E.g. Phishing > Malware > DOS

True

False

Answer explanation

A combination of attacks is usually used to increase the chances of a successful penetration of the system and decreases the chances of early detection.

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is safe to plug in any device to your computer, as long as you have used it before

True

False

Answer explanation

Even if the device is being used before, there is a chance it may already have been infected or compromised. The malware within just has not been activated yet.

6.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of the following is caused by a cyber attack?

Loss of personal data

System Disabled

Forgetting your password

Manipulation of Information

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a form of cyber attack?

Illegal Gatherings

Phishing

Fishing

Search & Arrest

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?