
Information Security
Authored by Daniel Cooke
Computers
9th Grade
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the best password?
V3ry_Long_H1pp0
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which key term has the following definition:
"Restricts the files and folders a user can open"
Access Rights
Malware
Properties
Hacking
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which keys when pressed together bring up a menu with an option to change your password?
<Ctrl>, <ALT>, <Delete>
<Ctrl>, <Shift>, <Esc>
<Windows>, <Tab>
<Ctrl>, <Shift>, <Tab>
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does PIN stand for?
Private Identification Number
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following options allows you to be uniquely identified on a network?
Password
PIN
Username
Access Rights
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
In the control panel, you can see if a f_______ is running.
This stops suspicious network traffic reaching your device.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
An anti-virus protects against lots of types of m______
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?