Search Header Logo

Privacy : Threats, Issues and Defenses

Authored by Sya Izz

Computers

Professional Development

Used 5+ times

Privacy : Threats, Issues and Defenses
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is true about security threat?

Refers to any possible malicious attack that seeks to unlawfully access data

A cyber attack that result from inserting malicious code into a server

A right that seeks to guarantee the protection of the personal data of users who access a service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital privacy is important for us to avoid..

Digital headprint

Digital earprint

Digital footprint

Digital handprint

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these are related to privacy defense?

Spied by a number of trackers when you are online

Keeping the information you like to keep to yourself from getting into the hands of hackers

A software that can be used to detect our personal details

A term that relates to the security of a computer system being compromised

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Disadvantages of not having a digital privacy are

Legal consequences related to criminal, civil, and labor liability

Respecting legal obligations regarding the protection of personal data

Disclosure of business secrets

Avoiding information security breaches and improving document management through better data control

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are the types of privacy issues?

Spying and snooping

Information mishandling

Location tracking

Password attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is true about phishing?

It can originate from terrorist groups, criminal organizations, hacker and corporate spies

Activate when a user clicks on a malicious link, which leads to installing dangerous software

Save your personal information and later use it for various purposes

Trick the receiver into opening it and carrying out the instructions inside

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Advantages of the digital privacy

Guaranteeing the data’s integrity, confidentiality, and availability

Ensuring respect for the rights and freedoms of your users

Risk of cyberattack

Disclosure of business secrets

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?