ICT Cyber Security Practice Test C

ICT Cyber Security Practice Test C

8th Grade

20 Qs

quiz-placeholder

Similar activities

Basic wage calculations

Basic wage calculations

8th - 10th Grade

15 Qs

A4 Managing Personal Finance

A4 Managing Personal Finance

5th - 12th Grade

20 Qs

Interests, Attitudes, and Values Quiz

Interests, Attitudes, and Values Quiz

6th - 8th Grade

20 Qs

Traffic Signs

Traffic Signs

KG - 11th Grade

18 Qs

Small Business and Business Growth

Small Business and Business Growth

6th Grade - University

20 Qs

Perniagaan Bab 5 T5

Perniagaan Bab 5 T5

1st Grade - Professional Development

20 Qs

Account class

Account class

8th Grade

20 Qs

REVISION 3 : TOPIC 3, 4, 5 & 7

REVISION 3 : TOPIC 3, 4, 5 & 7

1st Grade - University

20 Qs

ICT Cyber Security Practice Test C

ICT Cyber Security Practice Test C

Assessment

Quiz

Business

8th Grade

Easy

Created by

Salam Shuhaiber

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is inappropriate texting?

Knowing that a bullying situation is wrong and doing something to stop it

Following a set of rules for acceptable online behavior


Posting friendly messages in a chatroom environment

Exchanging abusive or suggestive messages or images with a mobile phone

Answer explanation

Inappropriate texting is the exchange of abusive or suggestive messages or images via mobile phone texting.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following practices protects your privacy in relation to your digital footprint?

Downloading the latest word-processing software from a Web site

Ensuring that your personal information is not shared online

Posting an image of footprints online

Keeping your files stored on a USB drive

Answer explanation

If you are leaving traces of personal information about yourself online, available for anyone to obtain, then you are damaging your "digital footprint."

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Sheila is new to online gaming. She asks her teacher what would be appropriate information to share while she is gaming or on the gaming forums. What would be the most likely response by her teacher?

It is safe to share her home address.

It is safe to share her favorite character on the game that she plays.

It is safe to share her first name but not her last name.

It is safe to share her school name.

Answer explanation


Discussing game favorites does not reveal a user's personal identity, therefore it is appropriate to share with the online community. Tips for gaming safety include:

  • Never give out personal information

  • Never agree to meet outside of the game

  • Do not respond to rude or bullying behavior

  • Block harassers or report them to the game's publisher

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a digital footprint?

A drawing of your own footprint using digital graphics software

Your assigned page in an online social networking site

Information about yourself that you post online for anyone to obtain

A print of a digital photograph showing a footprint

Answer explanation

If you are leaving traces of personal information about yourself online, available for anyone to obtain, then you are damaging your "digital footprint."

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Juan practices appropriate netiquette while online. What is netiquette?

Using all emoticons and abbreviations during online activities

Using offensive language online

Following a set of rules for acceptable online behavior

Posting annoying messages on social networking sites

Answer explanation

Netiquette suggests rules for appropriate online communications. Another term used is "network etiquette."

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Eli stores all of his personal information on his mobile phone. Which of the following is a security risk that Eli faces if his phone is lost or stolen?

Anyone who finds his phone will have access to personal information such as his user names, passwords, photos, home address, etc.

His parents will punish him for losing his phone.

Someone might return his phone to an address they find in his contacts.

He will have to purchase a new mobile phone, which will be expensive, and he will have to enter all his information again into the new phone.

Answer explanation

Personal information may be compromised if a phone is lost or stolen. The following can assist in protecting mobile devices and personal information: use a PIN or password, research apps before downloading, be aware of the phone's settings.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Malicious software is also known as:

copyright

adware

anti-virus.

malware

Answer explanation

Malicious software also called malware is created with the intent of causing harm to a computer or its user.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Business