TEJERO IMIL & DL

TEJERO IMIL & DL

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Networks

Networks

8th - 9th Grade

13 Qs

Passwords and Cyber Security

Passwords and Cyber Security

7th Grade

15 Qs

Social Engineering Pt1

Social Engineering Pt1

8th Grade

12 Qs

Password Safety

Password Safety

8th Grade

10 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

Jobs in ICT

Jobs in ICT

6th - 10th Grade

15 Qs

Office 365

Office 365

KG - University

10 Qs

Spreadsheet Charts & Advanced Functions

Spreadsheet Charts & Advanced Functions

6th - 8th Grade

11 Qs

TEJERO IMIL & DL

TEJERO IMIL & DL

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Kenneth Asuncion

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DICT mean?

Department of Information and Communications Technology

Department of Industrial Commerce and Technology

Department of Information Technology and Communications

Department on Infrastructure and Connections Technology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the primary goal of cyber security?

To increase internet speed

To prevent unauthorized access to computer systems

To develop new software programsT

To hack into other systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not an example of a cyber security threat?

Malware

Phishing

Firewall

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most effective way to protect against a phishing attack?

Keep software up to date

Use strong passwords

Use antivirus software

Be cautious of suspicious emails and links

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall?

To block unauthorized access to a network

To protect against viruses and malware

To encrypt sensitive data

To prevent physical theft of computer equipment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of two-factor authentication?

Entering a username and password

Scanning a fingerprint and entering a password

Answering a security question and entering a password

Entering a passphrase

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most secure way to store passwords?

Writing them down on a piece of paper

Storing them in a plain text file on a computer

Using a password manager

Using a simple password that is easy to remember

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?