EMPTECH Lesson 2 - STEM 1

EMPTECH Lesson 2 - STEM 1

11th Grade

8 Qs

quiz-placeholder

Similar activities

Internet Security

Internet Security

11th - 12th Grade

10 Qs

Computer Misuse Act

Computer Misuse Act

10th - 12th Grade

12 Qs

SOCIAL MEDIA & CYBER SAFETY

SOCIAL MEDIA & CYBER SAFETY

8th - 12th Grade

10 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

12 Qs

Internet Security

Internet Security

9th - 11th Grade

10 Qs

Cybersecurity 2 Chapter 1 Quiz

Cybersecurity 2 Chapter 1 Quiz

9th - 12th Grade

10 Qs

8.3 Security of data (2)

8.3 Security of data (2)

9th - 12th Grade

13 Qs

Phishing, Spam and Fake websites

Phishing, Spam and Fake websites

7th - 12th Grade

13 Qs

EMPTECH Lesson 2 - STEM 1

EMPTECH Lesson 2 - STEM 1

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Ronmar Gino

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What is identity theft and how can individuals protect themselves from it?

Safeguarding personal information, using strong passwords, and monitoring financial accounts regularly

Leaving personal documents in public places

Sharing personal information on social media

Using the same password for all accounts

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Explain the concept of phishing in the context of identity theft.

Attackers send physical threats to intimidate individuals into giving up their personal information.

Phishing involves catching fish in a body of water to steal people's identities.

Attackers use advanced encryption techniques to protect individuals' sensitive information.

Attackers impersonate legitimate organizations to trick individuals into providing sensitive information.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What is hacking and how does it differ from ethical hacking?

Ethical hacking is authorized and used to identify security vulnerabilities.

Hacking is used to improve security and ethical hacking is used to cause harm

Hacking and ethical hacking are the same thing

Hacking is a legal activity and ethical hacking is illegal

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Explain the term 'malware' and its role in hacking.

Malware is a legal software used for protecting computer systems

Malware is a term used to describe a type of computer virus

Malware is a type of hardware used for hacking

Malware is malicious software designed to damage or gain unauthorized access to a computer system.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What are the potential impacts of hacking on individuals and organizations?

Increased productivity and improved security.

Financial loss, data theft, reputation damage, and legal consequences

Enhanced reputation, and cost savings.

Convenience and Increase in social media followers.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What are some common online scams that individuals should be aware of?

Phone scams

Email scams

Phishing, identity theft, fake websites, and online shopping scams

Lottery scams

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

How can individuals identify and avoid falling victim to online scams?

By responding to every email received

By clicking on every link in emails

By sharing personal information with unknown sources

By being cautious of unsolicited emails, not clicking on suspicious links, verifying the legitimacy of websites, and not sharing personal information with unknown sources.

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What are data breaches and how do they occur?

Data breaches are accidental sharing of information, and they occur through social media posts.

Data breaches are authorized access to sensitive information, and they occur through regular software updates.

Data breaches are unauthorized access to sensitive information, and they occur through hacking, phishing, malware, or physical theft of devices.

Data breaches are intentional sharing of information, and they occur through email communication.