Y9 - CySe - L05 - Two-Factor Authentication (2FA) Quiz

Y9 - CySe - L05 - Two-Factor Authentication (2FA) Quiz

9th - 12th Grade

14 Qs

quiz-placeholder

Similar activities

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Health and Safety

Health and Safety

7th - 12th Grade

12 Qs

Create with Code Prototype 2 Quiz

Create with Code Prototype 2 Quiz

9th - 12th Grade

10 Qs

Cybersecurity Quiz from Youtube

Cybersecurity Quiz from Youtube

10th Grade

13 Qs

Identidad Digital y Plataformas

Identidad Digital y Plataformas

9th Grade

10 Qs

AP CSP code.org Unit 3 2020

AP CSP code.org Unit 3 2020

9th - 12th Grade

10 Qs

Cyber Camps 2018 -  Review Day 3 Windows

Cyber Camps 2018 - Review Day 3 Windows

7th - 12th Grade

17 Qs

BTEC DIT C3 LAB - User Access Restriction

BTEC DIT C3 LAB - User Access Restriction

10th - 11th Grade

10 Qs

Y9 - CySe - L05 - Two-Factor Authentication (2FA) Quiz

Y9 - CySe - L05 - Two-Factor Authentication (2FA) Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Terry Watts

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine Isabelle, Harry, and Alexander are playing an online game. Suddenly, they are asked to set up two-factor authentication (2FA). Can you help them understand what it is?

A type of computer virus

A type of game

A tool to keep their information safe online

A social media platform

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine William and Rohan are having a debate. William says that the purpose of using two-factor authentication (2FA) is to make logging in more complicated. Rohan disagrees. According to Rohan, what is the real purpose of using 2FA?

To keep your information safe online

To make logging in more complicated

To make logging in easier

To share your account with others

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Elsie, Isla, and Harry are having a race to log into their accounts with 2FA! What is the first step they should take?

Shout out their username

Type in their super secret password

Send their email address into cyberspace

Call out their phone number

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine Aarav is trying to log into his account with 2FA. What would be the second step he needs to take?

Enter a special code that was sent to Aarav in a text message or email

Enter Aarav's date of birth

Enter Aarav's favorite color

Enter Aarav's home address

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine Evie, Arjun, and Poppy are secret agents. They need to access a high-security vault. The vault uses biometrics as part of its 2FA. What does this mean?

They need to use a unique part of their body to log in

They need to use a special code to log in

They need to use a different password to log in

They need to use a different device to log in

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine Alexander, Rohan, and Sophia are on a secret mission. They need to use 2FA for secure communication. What would be the main advantage if they use biometrics in 2FA?

It is easy to remember

It is unique to each individual

It can be easily shared

It can be easily changed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Harry, Samuel, and Charlie are discussing the use of 2FA. Harry thinks it's a great security measure, but Samuel points out a main disadvantage. What does Samuel say?

It makes logging in more time-consuming

It makes logging in easier

It makes logging in less secure

It makes logging in more fun

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?