Safe & Responsible use of ICT

Safe & Responsible use of ICT

7th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Kuis Password Manager

Kuis Password Manager

KG - Professional Development

10 Qs

Networking Concepts

Networking Concepts

8th Grade

12 Qs

AI Generated Cyber Security Quiz

AI Generated Cyber Security Quiz

7th Grade

11 Qs

Brute force

Brute force

8th Grade

10 Qs

ClassLink Password Reset Quiz

ClassLink Password Reset Quiz

7th Grade - University

10 Qs

SaferInternet

SaferInternet

8th - 10th Grade

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Pre Test - Bimtek SAKTI Modul Admin 02082021

Pre Test - Bimtek SAKTI Modul Admin 02082021

1st Grade - University

11 Qs

Safe & Responsible use of ICT

Safe & Responsible use of ICT

Assessment

Quiz

Computers

7th - 8th Grade

Medium

Created by

Gabriel Aloisio

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who should know your password?

My household pet.

Only me.

The staff member of a website I use, of whom has just emailed me asking for my login details to fix something wrong with my profile.

Close friends and family, in case I forget.

Answer explanation

Even if your pet is incapable of human speech, the correct answer is always you, and only you.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "doxxing"?

Sharing someone's private details online.

Hacking into someone's profile.

Impersonating somebody else on social media.

Using somebody else's credit card to buy things online.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which these are outright examples of "Doxxing"?

Leaking someone's bank details online.

Posting a photo of someone else's family.

Publishing a video with another user's home address.

Sharing an email address in a comment.

Answer explanation

While posting a photo of someone else's family is weird and could be considered doxxing under certain circumstances, these two answers are considered outright examples.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords are considered "strong"?

Graeme123#

NsW-22

password

d5WxzLi81G#!

Answer explanation

For the sake of security, please don't use this any of these examples as a password.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

How often should you backup and update your devices?

As often as possible.

Weekly, monthly, half-yearly... As long as it's regular!

Never. I live life on the edge.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Multi-Factor Authentication (MFA)?

Using a really strong password.

Authenticating your identity via an app or separate service.

Providing two or more factors to verify a login.

I have no idea because I didn't read the resource and I should go back and read it.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the use of Multi-Factor Authentication (MFA)?

All of these are legitimate uses of MFA.

Logging into a site with both a password and a fingerprint.

Signing in with a password, and then confirming with a push notification on your phone.

Inputting your password and a separately issued code for confirmation.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers