Search Header Logo

SECURITY IN ICT

Authored by Gimena Yasmín

English

2nd Grade

Used 3+ times

SECURITY IN ICT
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of malware? / ¿Cuáles de los siguientes es un ejemplo de malware?

Firewall

Phishing

Virus

Encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is when attackers send fake emails to steal personal information / Phishing es cuando los atacantes envían correos falsos para robar información personal

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall? / ¿Cuál es el objetivo de un firewall?

To block unauthorized access

To create weak passwords

To steal data

To spread malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People __________ installing updates to protect their information.

are

is

am

be

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tense is used in the following sentence: "More companies are implementing these technologies"?

Present simple (general facts)

Present continuous (actions in progression)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password is the most secure? / ¿Cuál es la contraseña más segura?

123456

Qw1$56N7!

birthday

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption makes data readable for hackers / La encriptación hace legibles los datos para los hackers

True ✔️

False ❌

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?