Search Header Logo

Integrity & Cybersecurity Day 2024

Authored by INow Teknologi

Education

University

Used 1+ times

Integrity & Cybersecurity Day 2024
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following statements about a password is TRUE?

It must be changed only if it is compromised

It cannot contain special character symbols

It must be registered with the system administrator

It should be changed regularly

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to log on with a username and password?

To be aware of who is in the building

To check up on the time-keeping of users

To protect computers against unauthorized use

To enable a personalized greeting for each user

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following would be considered the BEST way to store a PIN number?

Keep a written of it with your bank cards

Store it in your computer

Memorize it

Keep a written note of it in your office drawer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes spam?

Gathering information about a person or organisation without their knowledge

Performing an unauthorized, usually malicious, action e.g. erasing files

Putting unnecessary load on the network by making copies of files

Sending unwanted bulk messages

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is MOST likely to be a hoax (fake news)?

An email from a friend you haven't seen recently

An email with an attachment sent by a colleague using their personal email address

An email asking you to go to a website for a free computer scan

An email advertisement from a local shop you subscribe to

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes why users should lock their computer when leaving their desk?

To prevent unauthorized access to data

To prevent a waste of electricity

To prevent data from getting corrupted

To prevent the computer from malfunctioning

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the unsafe online activity?

Using a screen name or nick name that cannot identify you

Meeting someone you met online face-to-face in the company of your parents

Keeping your social network profile private

Giving your home address to someone you met in a chat room

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?