Cyber Security: Safeguarding the Data
Quiz
•
Computers
•
3rd Grade
•
Practice Problem
•
Easy
Adrianna Dar
Used 5+ times
FREE Resource
Enhance your content in a minute
7 questions
Show all answers
1.
MATCH QUESTION
1 min • 1 pt
Confidentiality
Maintaining the accuracy and consistency of data by preventing unauthorized changes or alterations.
Integrity
Protecting sensitive information and ensuring that it is only accessible by authorized individuals.
Availability
Ensuring that data and systems are available when needed, and minimizing downtime due to cyber attacks or other disruptions.
2.
OPEN ENDED QUESTION
3 mins • 1 pt
Name the following example of Social Engineering technique:
An attacker leaves a USB drive in a common area, such as the school library or computer lab, with a label that says "Ms Dar Test Solution" or "Computing Science Answers."
When a curious student or staff member plugs in the USB drive, it installs malware on their computer, giving the attacker access to their data.
Evaluate responses using AI:
OFF
Answer explanation
Baiting
3.
OPEN ENDED QUESTION
3 mins • 1 pt
Name the social engineering technique in the following scenario:
An attacker poses as a school official and calls a student pretending to need urgent access to sensitive information, such as login details to resolve an issue.
The creates a sense of urgency or authority, to convince the victim to give away the information.
Evaluate responses using AI:
OFF
Answer explanation
Pretexting
4.
DRAG AND DROP QUESTION
1 min • 1 pt
Social Engineering is (a) manipulation of people into performing actions or giving out (b) which may not be in their (c)
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Personal Data refers to anything that can be used to identify a person. Personal Data can be either sensitive or non-sensitive. What needs to be done when handling sensitive data?
Data needs to be exposed
Data needs to be secured
Data needs to be accessed only by people who has been authorised to access it
Data needs to be accurate and up to date
6.
MATCH QUESTION
1 min • 1 pt
Any smart devices connected to the network of any kind
Anti Virus Software
Daily Updates of threats database
Regular Software Update & Security Patches
Face Scanner, Touch ID, email with access code
Strong Password
use of numbers, letters capital and small size, special characters,
2 Factor Authentication
7.
DROPDOWN QUESTION
1 min • 1 pt
Cyber security is all the (a) , processes and practices designed to (b) networks, computers, programs and data from attack, (c) and (d) access.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
11 questions
Regreso a Clases 2023
Quiz
•
1st - 5th Grade
10 questions
Cyber Safety Yr 2
Quiz
•
1st - 3rd Grade
8 questions
Keyword Internet searches
Quiz
•
2nd - 5th Grade
10 questions
Reading a map
Quiz
•
2nd - 5th Grade
10 questions
Nowe technologie
Quiz
•
1st - 6th Grade
12 questions
MAC KEYBOARD
Quiz
•
3rd - 9th Grade
10 questions
วิทยาวิทยาม.6
Quiz
•
3rd Grade
10 questions
Bitmap v Vector Images
Quiz
•
KG - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
