Protecting your data

Protecting your data

Professional Development

10 Qs

quiz-placeholder

Similar activities

Pivot Tables

Pivot Tables

Professional Development

10 Qs

Introducción al Flipped Learning

Introducción al Flipped Learning

Professional Development

10 Qs

ASM ADP || Lean Six Sigma || Revision Test

ASM ADP || Lean Six Sigma || Revision Test

Professional Development

15 Qs

URBAN DESIGN: THEORIES AND PRACTICES ALE 2022

URBAN DESIGN: THEORIES AND PRACTICES ALE 2022

Professional Development

15 Qs

NTME 2018 | ACU Robbery Quiz

NTME 2018 | ACU Robbery Quiz

Professional Development

10 Qs

Trg@home 1

Trg@home 1

Professional Development

10 Qs

Basic Clinical Chemistry

Basic Clinical Chemistry

Professional Development

10 Qs

Microsoft 365

Microsoft 365

Professional Development

11 Qs

Protecting your data

Protecting your data

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Medium

Created by

Elankayer Sithirasenan

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a best practice in choosing a good password?

Use dictionary words or names

Use common misspellings of dictionary words

Use computer names or account names

Use special characters and numbers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a NOT a best practice in securing a wireless network?

Enable SSID broadcast

Change the default password

Use WPA2 encryption feasure

Disable WiFi interface when not in use

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting the information into a form where an unauthorized party cannot read it is called

Encryption

Decryption

Hashing

Encoding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a suitable option to ensure that the organizational data is available as and when it is needed?

hot sites

warm sites

cold sites

web sites

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ is an open standard protocol that allows an end user's credentials to access third party applications without exposing the user's password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a best practice when using organizational email service?

do not open emails from unknown users

click open urls that looks suspicious

do not forward emails that looks suspicious

quarantine emails that looks suspicious

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT an emerging cyber security attacks?

Ransomware

Phishing

Boot sector corruption

Cryptojacking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development