Information Security - Year 7
Quiz
•
Instructional Technology, Education, Computers
•
7th - 9th Grade
•
Medium
Bennette Osae Addo
Used 2+ times
FREE Resource
Enhance your content in a minute
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maame needs some money. She went to ATM to withdraw some money. She covered her password when she was inputing, withdrew the money and she took her card back. However, her money has been stolen. Then she found the ATM has the virus program could copy the chip of her card and still has a micromonitor let hackers to see her password. What is correct in this case.
Maame violated Availability traid
The hacker violated Availability traid
Maame violated confidentally traid
The hacker violated confindentally traid
2.
OPEN ENDED QUESTION
30 sec • Ungraded
John-Bernard is hungry. He went to the tuck shop to buy Ekumfi Juice and Blue Pop Corn. He covered his password(Visa Card) when he was inputing and bought some items and redrew money as well. But he forgot to take his card back. He realised his money was stolen. What do you think happened ?
Evaluate responses using AI:
OFF
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Bimpong inserts a trojan program into Malik's laptop, and He found out Malik's password of his bank accounts. He did not take any money, so does he violate any laws?
Yes, he violated laws of Trade Secret, Business Secret
Yes, he violated laws of cybersecurity
No he did not
Yes, he violate the polity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If Jason sent some malware to Jude company's servers, who is responsible to this case?
Jason
Jude
Jason and Jude
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sena told her friend Joseph about her email password. And then she found Joseph used her email sent emails to others. Who is responsible for this case?
Sena
Joseph
Sena and Joseph
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Adwoa told her friend about her password of snapchat. What traid does she violate?
Confidentially
Integrity
Availability
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which refers as the practice of protecting information by mitigating information risks.
Vulnerability
Information Security
Vectors
Application
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
22 questions
Year 8 - L3 Homework
Quiz
•
8th Grade
25 questions
Tin 9: Bài 13. Phần mềm ghi âm và xử lí âm thanh AUDACITY
Quiz
•
9th Grade
30 questions
Introduction to computer
Quiz
•
7th - 8th Grade
22 questions
The Human Environment pt.2
Quiz
•
7th Grade
22 questions
Round 1: Hack The Quest
Quiz
•
8th Grade - University
22 questions
七年级第九课华语
Quiz
•
7th Grade
23 questions
Personal Computer as a Digital System
Quiz
•
7th Grade
23 questions
Week 15 IG2 Quiz
Quiz
•
1st Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
