Device Security

Device Security

6th Grade

10 Qs

quiz-placeholder

Similar activities

Computer parts

Computer parts

6th Grade

14 Qs

Types of Malware

Types of Malware

6th - 9th Grade

14 Qs

Cyber Security Quiz

Cyber Security Quiz

6th Grade

9 Qs

INTERNET SAFETY - MALWARE

INTERNET SAFETY - MALWARE

4th - 6th Grade

12 Qs

Software - Common Utility Programs

Software - Common Utility Programs

3rd - 12th Grade

10 Qs

Cybersecurity Basics

Cybersecurity Basics

6th Grade

15 Qs

Malware

Malware

6th - 9th Grade

14 Qs

Viruses & Malware

Viruses & Malware

6th - 8th Grade

10 Qs

Device Security

Device Security

Assessment

Quiz

Computers

6th Grade

Medium

Created by

Donna Barton

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common threats to devices?

spam emails, software bugs, weak passwords

malware, phishing attacks, physical theft, data breaches, and network vulnerabilities

cyber attacks, software updates, weak encryption

identity theft, software vulnerabilities, weak firewalls

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can viruses be prevented from infecting devices?

Never updating the operating system or applications

Clicking on every link and pop-up ad that appears on the screen

Using a firewall to block all incoming internet traffic

Using antivirus software, keeping the operating system and applications up to date, being cautious while downloading and opening files or attachments, and avoiding suspicious websites and links.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some intrusion prevention measures that can be taken to protect devices?

Disabling firewalls, using weak passwords, not updating software, not backing up data, not being cautious of phishing emails and suspicious links.

Using antivirus software, using weak passwords, disabling firewalls, not updating software, not implementing two-factor authentication.

Not installing antivirus software, using weak passwords, not enabling firewalls, not updating software, not implementing two-factor authentication.

Installing antivirus software, using strong passwords, enabling firewalls, updating software, implementing two-factor authentication, backing up data, being cautious of phishing emails and suspicious links.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What actions can be taken to protect devices from malicious activities?

Never update software or operating systems, use weak and common passwords, disable two-factor authentication, never install antivirus software, open all emails and attachments, click on all links, and never back up important data.

Regularly update software and operating systems, use strong and unique passwords, enable two-factor authentication, install and update antivirus software, be cautious of suspicious emails and attachments, avoid clicking on unknown links, and regularly back up important data.

Only update software occasionally, use simple and easily guessable passwords, disable two-factor authentication, never install antivirus software, open all emails and attachments, click on all links, and never back up important data.

Regularly update software and operating systems, use weak and common passwords, disable two-factor authentication, never install antivirus software, open all emails and attachments, click on all links, and never back up important data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a threat to devices? a) Viruses b) Intrusion c) Vandalism d) Encryption

a

b

c

d

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Installing antivirus software is an effective way to protect devices from viruses.

False

True

Antivirus software is unnecessary

Antivirus software slows down devices

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an intrusion prevention measure? a) Using strong passwords b) Opening email attachments from unknown sources c) Sharing personal information online d) Disabling firewall

a. Using weak passwords

b. Ignoring email attachments from unknown sources

c. Keeping personal information offline

d

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?