Search Header Logo

ICT Cyber Security Practice Test C

Authored by Salam Shuhaiber

Business

8th Grade

Used 4+ times

ICT Cyber Security Practice Test C
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is inappropriate texting?

Knowing that a bullying situation is wrong and doing something to stop it

Following a set of rules for acceptable online behavior


Posting friendly messages in a chatroom environment

Exchanging abusive or suggestive messages or images with a mobile phone

Answer explanation

Inappropriate texting is the exchange of abusive or suggestive messages or images via mobile phone texting.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following practices protects your privacy in relation to your digital footprint?

Downloading the latest word-processing software from a Web site

Ensuring that your personal information is not shared online

Posting an image of footprints online

Keeping your files stored on a USB drive

Answer explanation

If you are leaving traces of personal information about yourself online, available for anyone to obtain, then you are damaging your "digital footprint."

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Sheila is new to online gaming. She asks her teacher what would be appropriate information to share while she is gaming or on the gaming forums. What would be the most likely response by her teacher?

It is safe to share her home address.

It is safe to share her favorite character on the game that she plays.

It is safe to share her first name but not her last name.

It is safe to share her school name.

Answer explanation


Discussing game favorites does not reveal a user's personal identity, therefore it is appropriate to share with the online community. Tips for gaming safety include:

  • Never give out personal information

  • Never agree to meet outside of the game

  • Do not respond to rude or bullying behavior

  • Block harassers or report them to the game's publisher

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a digital footprint?

A drawing of your own footprint using digital graphics software

Your assigned page in an online social networking site

Information about yourself that you post online for anyone to obtain

A print of a digital photograph showing a footprint

Answer explanation

If you are leaving traces of personal information about yourself online, available for anyone to obtain, then you are damaging your "digital footprint."

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Juan practices appropriate netiquette while online. What is netiquette?

Using all emoticons and abbreviations during online activities

Using offensive language online

Following a set of rules for acceptable online behavior

Posting annoying messages on social networking sites

Answer explanation

Netiquette suggests rules for appropriate online communications. Another term used is "network etiquette."

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Eli stores all of his personal information on his mobile phone. Which of the following is a security risk that Eli faces if his phone is lost or stolen?

Anyone who finds his phone will have access to personal information such as his user names, passwords, photos, home address, etc.

His parents will punish him for losing his phone.

Someone might return his phone to an address they find in his contacts.

He will have to purchase a new mobile phone, which will be expensive, and he will have to enter all his information again into the new phone.

Answer explanation

Personal information may be compromised if a phone is lost or stolen. The following can assist in protecting mobile devices and personal information: use a PIN or password, research apps before downloading, be aware of the phone's settings.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Malicious software is also known as:

copyright

adware

anti-virus.

malware

Answer explanation

Malicious software also called malware is created with the intent of causing harm to a computer or its user.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?