GROUP 1- QUIZ 2 EMPTECH

GROUP 1- QUIZ 2 EMPTECH

11th Grade

11 Qs

quiz-placeholder

Similar activities

Banning the Veil Part 4

Banning the Veil Part 4

11th Grade

10 Qs

Klik dengan Bijak Kuiz

Klik dengan Bijak Kuiz

KG - University

15 Qs

PF 6.02, 6.03, 6.04

PF 6.02, 6.03, 6.04

KG - University

16 Qs

history of money

history of money

10th - 11th Grade

11 Qs

ADDIE Review

ADDIE Review

9th - 12th Grade

11 Qs

HERO - GAYAB MODE ON BY ASHUTOSH

HERO - GAYAB MODE ON BY ASHUTOSH

4th - 12th Grade

10 Qs

Identify...

Identify...

5th Grade - Professional Development

10 Qs

Intervention Lycée Descartes M2DNUM

Intervention Lycée Descartes M2DNUM

9th - 12th Grade

9 Qs

GROUP 1- QUIZ 2 EMPTECH

GROUP 1- QUIZ 2 EMPTECH

Assessment

Quiz

Other

11th Grade

Practice Problem

Medium

Created by

Qwnycy Carisma

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A tactic where a victim is manipulated or deceived to gain control over a computer system or to steal personal and financial information.

Phishing Attack

Social Engineering

Identity Theft

Malware and Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a benefit of Two-Factor Authentication (2FA)?

Enhanced Security

User Trust and Compliance

Unauthorized Access

Reduced Risks of Identity Theft

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A form of malicious software used by cybercriminals to block access to data on infected devices or networks, demanding payment to restore access.

Phishing Attack

Social Engineering

Identity Theft

Malware and Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How should you properly manage your passwords?

Use the same password for multiple accounts.

Share your passwords with your friends.

Use your birthdate and name as your password.

  1. Generate strong, unique passwords for each site.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What should you NOT do if you are a victim of an online threat?

  1. Change passwords immediately 

Ignore the threat and assume that it’s a prank.

  1. Notify relevant parties

  1. Report to authorities

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. This refers to the digital realm created by the internet and computer networks, including online communication, social media, digital commerce, and virtual spaces. 

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. A type of cyberattack where fraudulent emails, texts, calls, or websites are used to trick people into sharing sensitive data or downloading malware.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?