Gr 12 Term 2 Week 4

Gr 12 Term 2 Week 4

12th Grade

15 Qs

quiz-placeholder

Similar activities

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

Level 8

Level 8

9th - 12th Grade

20 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Computer Security Risk

Computer Security Risk

11th Grade - University

16 Qs

J277 - 1.4 - Network Threats

J277 - 1.4 - Network Threats

10th Grade - University

16 Qs

Encryption

Encryption

12th Grade

19 Qs

Online Safety

Online Safety

6th - 12th Grade

11 Qs

Chapter 2 Utility Software

Chapter 2 Utility Software

12th Grade

20 Qs

Gr 12 Term 2 Week 4

Gr 12 Term 2 Week 4

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ohann Dyk

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is used to authenticate your identity by determining what you have, know, and who you are?

Audit controls

Use of PIN

Encryption programs

Biometric devices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method of altering data so that it is not usable unless the encryption is unlocked?

Use of PIN

Firewall

Audit controls

Encryption programs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is recommended to protect your computer from various forms of malware, viruses, and other malicious software?

Firewall

Strong passwords

Encryption

Social media settings

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do to avoid being a target of cybercrime?

Use public Wi-Fi hotspots

Store passwords on mobile devices

Change login details regularly

Share personal information online

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do to protect your data such as tax returns or financial records?

Activate firewall settings

Make regular backups

Use public Wi-Fi hotspots

Share personal information online

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you be cautious of when giving out personal information on the internet?

Use of PIN

Encryption programs

Secure websites

Audit controls

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus attaches itself to computer systems and destroys or corrupts data?

Polymorphic virus

File virus

Trojan horse

Boot sector virus

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?