Unit 8 - Cyber Issues: Passwords

Unit 8 - Cyber Issues: Passwords

8th Grade

24 Qs

quiz-placeholder

Similar activities

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

Authentication

Authentication

8th Grade

20 Qs

Windows Vocab

Windows Vocab

6th - 8th Grade

25 Qs

March Revision

March Revision

8th Grade

22 Qs

Cyber Camps 2018 - Day 2 Review

Cyber Camps 2018 - Day 2 Review

6th - 12th Grade

24 Qs

Computer Crimes and Computer Ethics

Computer Crimes and Computer Ethics

6th - 10th Grade

21 Qs

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

Privacy Settings for Online Safety

Privacy Settings for Online Safety

8th Grade

20 Qs

Unit 8 - Cyber Issues: Passwords

Unit 8 - Cyber Issues: Passwords

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Robert Yanowski

Used 195+ times

FREE Resource

24 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An individual who operates a device such as computer or a system is known as:

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of using additional login methods to accurately identify the correct user for the account is known as:

Password

User

Logging in

Two-Factor Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ are any lower-case, upper-case, digits, or special symbols used in passwords.

User

Characters

Keys

Symbols

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A __________ is a secret word or phrase which must be used to gain admission to something like an email account or computer program

Logging in

Characters

Password

User

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term for the process by which an individual gains access to a computer system or account by identifying and authenticating themselves is what?

User

Logging in

Password

Two-Factor Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passwords are the most common form of security.

TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of using additional login methods?

Login security

Password protection

Safety authentication

Two-Factor Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?