Cyber Security Best Practices for Journalism

Cyber Security Best Practices for Journalism

University

10 Qs

quiz-placeholder

Similar activities

Báo chí đa nền tảng

Báo chí đa nền tảng

University

15 Qs

Lector de venas

Lector de venas

University

11 Qs

Indian Newspaper Day

Indian Newspaper Day

University

10 Qs

New Media Quiz 5

New Media Quiz 5

University

10 Qs

Digital Security

Digital Security

University

11 Qs

Fighting Pandemic with Effective Communication Strategies

Fighting Pandemic with Effective Communication Strategies

University

10 Qs

Social Media Marketing

Social Media Marketing

University

15 Qs

Reading #01 quiz (How Young People Consume News)

Reading #01 quiz (How Young People Consume News)

University

10 Qs

Cyber Security Best Practices for Journalism

Cyber Security Best Practices for Journalism

Assessment

Quiz

Journalism

University

Hard

Created by

Payal Bhalani

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of understanding threat models in secure communication methods for journalists?

To identify potential sources for sensitive information

To determine the capabilities of adversaries

To select the most secure communication tools

To establish trust with anonymous sources

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which messaging app is often recommended for its strong focus on privacy and end-to-end encryption?

Signal

WhatsApp

Wire

Telegram

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which service provides end-to-end encrypted email options for journalists?

ProtonMail

Tutanota

Gmail

Outlook

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Secure Drop?

An open-source whistleblower submission system

A secure messaging app

A virtual private network

An encrypted storage solution

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool can be used to encrypt internet traffic and make it harder for third parties to intercept or trace communications?

Virtual Private Networks (VPNs)

Tor Browser

Signal

RedPhone

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Tor Browser and the Tor Network allow users to do?

Access the web anonymously

Encrypt phone calls

Create encrypted containers

Strip metadata from files

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which app can be used for end-to-end encrypted voice calls?

Signal

RedPhone

WhatsApp

Wire

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?