Information Security - Year 7

Quiz
•
Instructional Technology, Education, Computers
•
7th - 9th Grade
•
Medium
Bennette Osae Addo
Used 2+ times
FREE Resource
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maame needs some money. She went to ATM to withdraw some money. She covered her password when she was inputing, withdrew the money and she took her card back. However, her money has been stolen. Then she found the ATM has the virus program could copy the chip of her card and still has a micromonitor let hackers to see her password. What is correct in this case.
Maame violated Availability traid
The hacker violated Availability traid
Maame violated confidentally traid
The hacker violated confindentally traid
2.
OPEN ENDED QUESTION
30 sec • 1 pt
John-Bernard is hungry. He went to the tuck shop to buy Ekumfi Juice and Blue Pop Corn. He covered his password(Visa Card) when he was inputing and bought some items and redrew money as well. But he forgot to take his card back. He realised his money was stolen. What do you think happened ?
Evaluate responses using AI:
OFF
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Bimpong inserts a trojan program into Malik's laptop, and He found out Malik's password of his bank accounts. He did not take any money, so does he violate any laws?
Yes, he violated laws of Trade Secret, Business Secret
Yes, he violated laws of cybersecurity
No he did not
Yes, he violate the polity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If Jason sent some malware to Jude company's servers, who is responsible to this case?
Jason
Jude
Jason and Jude
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sena told her friend Joseph about her email password. And then she found Joseph used her email sent emails to others. Who is responsible for this case?
Sena
Joseph
Sena and Joseph
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Adwoa told her friend about her password of snapchat. What traid does she violate?
Confidentially
Integrity
Availability
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which refers as the practice of protecting information by mitigating information risks.
Vulnerability
Information Security
Vectors
Application
Create a free account and access millions of resources
Similar Resources on Wayground
26 questions
Computer Maintenance

Quiz
•
8th - 10th Grade
30 questions
Year 8 - EOUT - Cyber Security - 2021/2022

Quiz
•
8th Grade
22 questions
Lab Safety Test: Cyber Foundations2 _Coach Aaron

Quiz
•
6th - 12th Grade
22 questions
Office 365 Programs

Quiz
•
7th - 8th Grade
26 questions
Computer Virus

Quiz
•
7th Grade
23 questions
9J2 Revision Quiz

Quiz
•
8th Grade
25 questions
Social Engineering and Malware

Quiz
•
8th - 11th Grade
25 questions
CyberSecurity Test

Quiz
•
7th Grade
Popular Resources on Wayground
15 questions
Hersheys' Travels Quiz (AM)

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
30 questions
Lufkin Road Middle School Student Handbook & Policies Assessment

Quiz
•
7th Grade
20 questions
Multiplication Facts

Quiz
•
3rd Grade
17 questions
MIXED Factoring Review

Quiz
•
KG - University
10 questions
Laws of Exponents

Quiz
•
9th Grade
10 questions
Characterization

Quiz
•
3rd - 7th Grade
10 questions
Multiply Fractions

Quiz
•
6th Grade
Discover more resources for Instructional Technology
15 questions
Hersheys' Travels Quiz (AM)

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
30 questions
Lufkin Road Middle School Student Handbook & Policies Assessment

Quiz
•
7th Grade
17 questions
MIXED Factoring Review

Quiz
•
KG - University
10 questions
Laws of Exponents

Quiz
•
9th Grade
10 questions
Characterization

Quiz
•
3rd - 7th Grade
20 questions
Guess The Cartoon!

Quiz
•
7th Grade