Protecting your data

Protecting your data

Professional Development

10 Qs

quiz-placeholder

Similar activities

Blended Learning

Blended Learning

Professional Development

10 Qs

A Blended Approach to Learning

A Blended Approach to Learning

Professional Development

11 Qs

Coursera: Learn To Teach Online Quiz 1

Coursera: Learn To Teach Online Quiz 1

Professional Development

10 Qs

Blended or Personalized?

Blended or Personalized?

Professional Development

8 Qs

Staying safe online

Staying safe online

Professional Development

10 Qs

Blended Learning

Blended Learning

Professional Development

10 Qs

Content Creation Skills

Content Creation Skills

Professional Development

13 Qs

Testing and Security

Testing and Security

Professional Development

7 Qs

Protecting your data

Protecting your data

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Elankayer Sithirasenan

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a best practice in choosing a good password?

Use dictionary words or names

Use common misspellings of dictionary words

Use computer names or account names

Use special characters and numbers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a NOT a best practice in securing a wireless network?

Enable SSID broadcast

Change the default password

Use WPA2 encryption feasure

Disable WiFi interface when not in use

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting the information into a form where an unauthorized party cannot read it is called

Encryption

Decryption

Hashing

Encoding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a suitable option to ensure that the organizational data is available as and when it is needed?

hot sites

warm sites

cold sites

web sites

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ is an open standard protocol that allows an end user's credentials to access third party applications without exposing the user's password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT a best practice when using organizational email service?

do not open emails from unknown users

click open urls that looks suspicious

do not forward emails that looks suspicious

quarantine emails that looks suspicious

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is NOT an emerging cyber security attacks?

Ransomware

Phishing

Boot sector corruption

Cryptojacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?