Data Ethics and Security

Data Ethics and Security

Professional Development

8 Qs

quiz-placeholder

Similar activities

Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Professional Development

12 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

Te Rito - Cyber Security

Te Rito - Cyber Security

Professional Development

12 Qs

Phishing Micro Workshop Quiz

Phishing Micro Workshop Quiz

Professional Development

12 Qs

Be Wary of Phishing

Be Wary of Phishing

Professional Development

10 Qs

beware of phishing

beware of phishing

Professional Development

10 Qs

System Ethical Hacking

System Ethical Hacking

Professional Development

10 Qs

Atrnet security quiz

Atrnet security quiz

Professional Development

9 Qs

Data Ethics and Security

Data Ethics and Security

Assessment

Quiz

Religious Studies, Fun, Computers

Professional Development

Medium

Created by

Saul Goodman

Used 8+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Media Image

What is a safe password?

5aulGoodm5n

password12345

admin

Mm_f."Ck:$VE,kt6

Answer explanation

Don' use common passwords or include your name/personal info, use a mix of different characters and symbols

2.

FILL IN THE BLANK QUESTION

45 sec • 5 pts

Media Image

what type of email scam involves you clicking on a malicious link that is sent to you?

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which photo could reveal personal info about yourself?

Media Image
Media Image
Media Image
Media Image

Answer explanation

Be carefull of what you upload online as it can reveal unwanted information

4.

MULTIPLE CHOICE QUESTION

30 sec • 6 pts

Is cloud computing immune from cyber attacks?

Yes, large companies are immune to these attacks

No, Anyone is vulnerable to cyber attacks even companies

Answer explanation

Media Image

No, million of online databases are compromised around the world every day, even large companies like Facebook are not invulnerable to these attacks

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is unethical use of user data?

Selling it to advertisers

Collecting data and using with malicious intent

Storing passwords in a database so the user can access their account

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

How can computer be used ethically

Utilizing social media

watching movies

Doxxing people online

Using chatrooms

7.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

What is Doxxing

Search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent

Looking for a long lost person online utilizing public databases and social media to find said long lost person

Threatening to publicize archived tweets in an inflammatory manner

Unboxing and building a high-end production quality computer for large companies and software intensive applications.

8.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What connections are relatively safe?

Public coffee shop

Home internet

Airport wifi

McDonalds WiFry

Answer explanation

All public internet connection are very vulnerable to attacks however home internet has the possibility of becoming compromised