Search Header Logo

Gr 10 Week 6

Authored by Ohann Dyk

Computers

10th Grade

Used 1+ times

Gr 10 Week 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is email security?

Email security is only about setting a strong password

Email security involves implementing encryption, strong passwords, multi-factor authentication, spam filters, and regular security updates to prevent phishing attacks, malware infections, and data leaks.

Email security does not involve encryption or multi-factor authentication

Email security is not necessary for personal accounts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is email security important?

Email security is important to share personal information openly

Email security is important to make it easier for hackers to access sensitive data

Email security is important to protect sensitive information, prevent unauthorized access, avoid phishing attacks, and maintain privacy.

Email security is important to increase the risk of phishing attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is key logging?

Key logging is the action of recording mouse movements.

Key logging is the action of encrypting data on a computer.

Key logging is the action of recording the keys struck on a keyboard.

Key logging is the action of monitoring network traffic.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does key logging software work?

Key logging software can only record keystrokes from specific applications.

Key logging software records keystrokes made by a user.

Key logging software encrypts all keystrokes to protect user data.

Key logging software records mouse movements instead of keystrokes.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the risks associated with key logging software?

The risks associated with key logging software include potential exposure of sensitive information, identity theft, financial loss, and privacy breaches.

Improved system performance

Increased security measures

Enhanced data protection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can individuals protect themselves from key logging software?

Share passwords with friends and family

Wear sunglasses while using the computer

Click on every pop-up advertisement

Use anti-keylogging software, be cautious of suspicious links and downloads, keep software updated, use two-factor authentication, and avoid public Wi-Fi for sensitive activities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common email security measures?

Biometric authentication, Public Wi-Fi usage, Sharing passwords via email

Strong passwords, two-factor authentication, caution with phishing emails, software updates, encryption, email filtering

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?