TEJERO IMIL & DL

TEJERO IMIL & DL

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Databases - Validating Data

Databases - Validating Data

3rd - 12th Grade

10 Qs

Digital Wellness Quiz Part 1

Digital Wellness Quiz Part 1

6th Grade

15 Qs

Creating Passwords

Creating Passwords

3rd - 6th Grade

14 Qs

Phishing and passwords

Phishing and passwords

7th Grade

12 Qs

Passwords

Passwords

8th - 11th Grade

14 Qs

01 | Encryption/Security Measures (H/W 4)

01 | Encryption/Security Measures (H/W 4)

7th Grade

10 Qs

phishing

phishing

8th - 9th Grade

10 Qs

Safer Internet Day

Safer Internet Day

5th - 9th Grade

10 Qs

TEJERO IMIL & DL

TEJERO IMIL & DL

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Kenneth Asuncion

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DICT mean?

Department of Information and Communications Technology

Department of Industrial Commerce and Technology

Department of Information Technology and Communications

Department on Infrastructure and Connections Technology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the primary goal of cyber security?

To increase internet speed

To prevent unauthorized access to computer systems

To develop new software programsT

To hack into other systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not an example of a cyber security threat?

Malware

Phishing

Firewall

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most effective way to protect against a phishing attack?

Keep software up to date

Use strong passwords

Use antivirus software

Be cautious of suspicious emails and links

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall?

To block unauthorized access to a network

To protect against viruses and malware

To encrypt sensitive data

To prevent physical theft of computer equipment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of two-factor authentication?

Entering a username and password

Scanning a fingerprint and entering a password

Answering a security question and entering a password

Entering a passphrase

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most secure way to store passwords?

Writing them down on a piece of paper

Storing them in a plain text file on a computer

Using a password manager

Using a simple password that is easy to remember

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?