Digital Threats

Digital Threats

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

keamanan jaringan komputer

keamanan jaringan komputer

11th Grade

15 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Networking -  Quiz 5 - Biometric Authentication

Networking - Quiz 5 - Biometric Authentication

9th Grade

9 Qs

Cyber & Risk Management

Cyber & Risk Management

10th Grade

10 Qs

Network Security Protocols

Network Security Protocols

10th Grade

15 Qs

Cybersecurity Security Controls

Cybersecurity Security Controls

12th Grade

10 Qs

Computer Security Authentication Quiz

Computer Security Authentication Quiz

12th Grade

10 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

Digital Threats

Digital Threats

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ms Rahman

Used 63+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Anna is shopping, she is out of her mobile data, she finds free public wifi asking der details only to log in, what should Anna do?

That's awesome lets go online

No way! I am not sharing my details on public WIFI.

I can share with my parents details.

I will look for more options.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these passwords is the most secure?

MyFav_3t1sC@t

ABCD1234

Password

123456789

3.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are examples of biometric security measures?

(SELECT MORE THAN ONE ANSWER)

Eye scan

Voice recognition

Key card

Facial recognition

Fingerprint

4.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are drawbacks of two factor authentication? (Choose all that apply)

It can take less management as users are unlikely to get locked out.

It can take longer to get access as you may have to wait for a code to be sent.

Users may feel it is an invasion of privacy by having their data stored.

The recovery options that are used to reset the account can be exploited

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Which one is the secured website?

www.secure.co.uk

https://www.secure.co.uk

http://www.secure.com

http://www.securewebsite.com

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is not a feature of effective anti-virus software?

Automated data backup

Malware detection

Parental controls

Social media protection

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Rebecca has received a suspicious email from someone pretending to be from her bank.

What sort of threat is this?

Data theft

Eavesdropping

Phishing

Trojan

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?