Digital Threats

Digital Threats

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

TMK  TAHUN 4

TMK TAHUN 4

10th Grade

10 Qs

Quiz Perkakas Teknologi Digital

Quiz Perkakas Teknologi Digital

10th Grade

14 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

Empowerment Technologies Quiz 2

Empowerment Technologies Quiz 2

11th Grade

10 Qs

test 3.6

test 3.6

11th Grade

10 Qs

Chapter 3 Exploring Linux Filesystems

Chapter 3 Exploring Linux Filesystems

11th Grade - University

10 Qs

IP ADDRESSING AND ITS VERSION

IP ADDRESSING AND ITS VERSION

11th Grade

15 Qs

Networks and Internet

Networks and Internet

10th Grade

10 Qs

Digital Threats

Digital Threats

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ms Rahman

Used 64+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Anna is shopping, she is out of her mobile data, she finds free public wifi asking der details only to log in, what should Anna do?

That's awesome lets go online

No way! I am not sharing my details on public WIFI.

I can share with my parents details.

I will look for more options.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these passwords is the most secure?

MyFav_3t1sC@t

ABCD1234

Password

123456789

3.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are examples of biometric security measures?

(SELECT MORE THAN ONE ANSWER)

Eye scan

Voice recognition

Key card

Facial recognition

Fingerprint

4.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are drawbacks of two factor authentication? (Choose all that apply)

It can take less management as users are unlikely to get locked out.

It can take longer to get access as you may have to wait for a code to be sent.

Users may feel it is an invasion of privacy by having their data stored.

The recovery options that are used to reset the account can be exploited

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Which one is the secured website?

www.secure.co.uk

https://www.secure.co.uk

http://www.secure.com

http://www.securewebsite.com

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is not a feature of effective anti-virus software?

Automated data backup

Malware detection

Parental controls

Social media protection

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Rebecca has received a suspicious email from someone pretending to be from her bank.

What sort of threat is this?

Data theft

Eavesdropping

Phishing

Trojan

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers