GROUP 1- QUIZ 2 EMPTECH

GROUP 1- QUIZ 2 EMPTECH

11th Grade

11 Qs

quiz-placeholder

Similar activities

3.8 - Reconstructive Memory

3.8 - Reconstructive Memory

11th - 12th Grade

13 Qs

Criminal Law Vocab

Criminal Law Vocab

9th - 12th Grade

15 Qs

Chapter : 2 - Emerging Trends

Chapter : 2 - Emerging Trends

11th Grade

14 Qs

QUIZ Klasifikasi Bisnis Ritel

QUIZ Klasifikasi Bisnis Ritel

11th Grade

15 Qs

Introduction to Media and Information Literacy

Introduction to Media and Information Literacy

11th - 12th Grade

10 Qs

Charles Manson

Charles Manson

9th Grade - University

15 Qs

EmTech Q1 Post Test 1

EmTech Q1 Post Test 1

11th Grade

10 Qs

gamer quiz

gamer quiz

1st Grade - Professional Development

15 Qs

GROUP 1- QUIZ 2 EMPTECH

GROUP 1- QUIZ 2 EMPTECH

Assessment

Quiz

Other

11th Grade

Practice Problem

Medium

Created by

Qwnycy Carisma

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A tactic where a victim is manipulated or deceived to gain control over a computer system or to steal personal and financial information.

Phishing Attack

Social Engineering

Identity Theft

Malware and Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a benefit of Two-Factor Authentication (2FA)?

Enhanced Security

User Trust and Compliance

Unauthorized Access

Reduced Risks of Identity Theft

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A form of malicious software used by cybercriminals to block access to data on infected devices or networks, demanding payment to restore access.

Phishing Attack

Social Engineering

Identity Theft

Malware and Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How should you properly manage your passwords?

Use the same password for multiple accounts.

Share your passwords with your friends.

Use your birthdate and name as your password.

  1. Generate strong, unique passwords for each site.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What should you NOT do if you are a victim of an online threat?

  1. Change passwords immediately 

Ignore the threat and assume that it’s a prank.

  1. Notify relevant parties

  1. Report to authorities

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. This refers to the digital realm created by the internet and computer networks, including online communication, social media, digital commerce, and virtual spaces. 

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. A type of cyberattack where fraudulent emails, texts, calls, or websites are used to trick people into sharing sensitive data or downloading malware.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?