Cyber Security: Safeguarding the Data

Cyber Security: Safeguarding the Data

3rd Grade

7 Qs

quiz-placeholder

Similar activities

Arkom 3

Arkom 3

3rd Grade

10 Qs

Sharing Santai #5 OJS & ABC

Sharing Santai #5 OJS & ABC

1st - 3rd Grade

10 Qs

Do you know alot about Roblox?

Do you know alot about Roblox?

2nd Grade - University

10 Qs

Gr3-Scratch - Revision

Gr3-Scratch - Revision

3rd - 5th Grade

11 Qs

Logos - Digital Images

Logos - Digital Images

2nd - 10th Grade

10 Qs

QUIZZ 2 : DATABASE FUNDAMENTALS

QUIZZ 2 : DATABASE FUNDAMENTALS

1st - 3rd Grade

10 Qs

Computer Networks - Introduction

Computer Networks - Introduction

1st - 5th Grade

10 Qs

DBT-meetup quiz

DBT-meetup quiz

1st - 3rd Grade

10 Qs

Cyber Security: Safeguarding the Data

Cyber Security: Safeguarding the Data

Assessment

Quiz

Computers

3rd Grade

Practice Problem

Easy

Created by

Adrianna Dar

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Confidentiality

Maintaining the accuracy and consistency of data by preventing unauthorized changes or alterations.

Integrity

Protecting sensitive information and ensuring that it is only accessible by authorized individuals.

Availability

Ensuring that data and systems are available when needed, and minimizing downtime due to cyber attacks or other disruptions.

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Name the following example of Social Engineering technique:

An attacker leaves a USB drive in a common area, such as the school library or computer lab, with a label that says "Ms Dar Test Solution" or "Computing Science Answers."

When a curious student or staff member plugs in the USB drive, it installs malware on their computer, giving the attacker access to their data.

Evaluate responses using AI:

OFF

Answer explanation

Baiting

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Name the social engineering technique in the following scenario:

An attacker poses as a school official and calls a student pretending to need urgent access to sensitive information, such as login details to resolve an issue.

The creates a sense of urgency or authority, to convince the victim to give away the information.

Evaluate responses using AI:

OFF

Answer explanation

Pretexting

4.

DRAG AND DROP QUESTION

1 min • 1 pt

Social Engineering is ​ (a)   manipulation of people into performing actions or giving out ​ (b)   which may not be in their ​ (c)  

psychological
confidential information
best interests.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Personal Data refers to anything that can be used to identify a person. Personal Data can be either sensitive or non-sensitive. What needs to be done when handling sensitive data?

Data needs to be exposed

Data needs to be secured

Data needs to be accessed only by people who has been authorised to access it

Data needs to be accurate and up to date

6.

MATCH QUESTION

1 min • 1 pt

Match the following

Any smart devices connected to the network of any kind

Anti Virus Software

Daily Updates of threats database

Regular Software Update & Security Patches

Face Scanner, Touch ID, email with access code

Strong Password

use of numbers, letters capital and small size, special characters,

2 Factor Authentication

7.

DROPDOWN QUESTION

1 min • 1 pt

Cyber security is all the ​ (a)   , processes and practices designed to ​ (b)   networks, computers, programs and data from attack, ​ (c)   and ​ (d)   access.

technologies
protect
damage
unauthorised

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?