Search Header Logo

Online data security

Authored by Marcos Sanchez-Camero

Computers

8th Grade

Used 2+ times

Online data security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IP-based geolocation is typically the most accurate of all techniques

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

if you suspect an email is a phishing attack, is it ok to click on any links or download if it looks okay

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is not a geolocation position system?

ip based

ethernet positioning

Cell

GPS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Personally Identifiable Information (PII). PII refers to any data that can help identify you, such as your address or name.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are signs of a phishing attack?

Suspicious URL

Suspicious email address

Requests for sensitive information

All are signs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do you protect your computer systems?

Firewall

Firewall

Security patches

Virus software

All

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?