Stay Safe Online Campaign

Stay Safe Online Campaign

University

25 Qs

quiz-placeholder

Similar activities

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

Deploying Printers Using Group Policy

Deploying Printers Using Group Policy

12th Grade - University

20 Qs

Telecommunication switching

Telecommunication switching

University

20 Qs

EC8702_ADWSN::Unit-4_Quiz-5

EC8702_ADWSN::Unit-4_Quiz-5

University

30 Qs

Week 6 - IT Job Roles

Week 6 - IT Job Roles

University

20 Qs

PROGRAMMING TECHNIQUES

PROGRAMMING TECHNIQUES

University - Professional Development

25 Qs

BCS Network Security Test 7

BCS Network Security Test 7

University - Professional Development

20 Qs

EC8702_ADWSN::Unit-2_Quiz-3

EC8702_ADWSN::Unit-2_Quiz-3

University

20 Qs

Stay Safe Online Campaign

Stay Safe Online Campaign

Assessment

Quiz

Education

University

Hard

Created by

M PRAGATHESH

Used 16+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a digital footprint refers to?

A scanned image of your foot

A photograph of your shoe

All the information online about a person that is stored online

Having a blog, facebook or twitter page

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is an example of phishing?

An email directing the recipient to enter personal details on a fake website

An email warning the recipient of a computer virus threat

An email directing the recipient to forward the email to friends

An email directing the recipient to download an attachment

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best in terms of cyber safety describes why bluetooth device settings should be adjusted ?

To increase the range of device

To prevent the risk of unauthorised access

To reduce interference from other devices

To improve the quality of reception

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the appropriate definition of spamming ?

Gathering information about a person or organisation without their knowledge

Performing an unauthorised usually malicious action such as erasing files

Putting unnecessary load on the network by making copies of files

Sending unwanted bulk messages

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes a Public Network?

A network where devices outside the network cannot see or communicate directly with Computers on the network

A network where devices outside the network can see but not communicate directly with Computers on the network

A network where devices outside the network can see and communicate directly with Computers on the network

A network where devices outside the network cannot see but can communicate directly with Computers on the network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The letter 's' in "https://" at the beginning of the URL stands for

Safe

Secure

Special

Site

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This is called as

Botnet

Vishing

Phishing

Ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?