Ethics, Privacy, and Information Security Quiz

Ethics, Privacy, and Information Security Quiz

12th Grade

15 Qs

quiz-placeholder

Similar activities

PROGRAMMING-REVIEW DAY

PROGRAMMING-REVIEW DAY

12th Grade

20 Qs

BITS AND BYTES - THE FUTURE OF CYBERSECURITY - SENIOR PRELIM

BITS AND BYTES - THE FUTURE OF CYBERSECURITY - SENIOR PRELIM

12th Grade

15 Qs

Online Privacy Awareness Quiz

Online Privacy Awareness Quiz

7th Grade - University

13 Qs

ICT G7 Chapter 2.2 Direct Data Entry Devices

ICT G7 Chapter 2.2 Direct Data Entry Devices

7th Grade - University

15 Qs

YEAR 7 MID-TERM  ASSESSMENT

YEAR 7 MID-TERM ASSESSMENT

7th Grade - University

20 Qs

DRRR_Quarter 1_Quiz No. 1

DRRR_Quarter 1_Quiz No. 1

12th Grade

10 Qs

Advanced Drone Regulations Quiz

Advanced Drone Regulations Quiz

5th Grade - University

20 Qs

PDPA - Is it just common sense?

PDPA - Is it just common sense?

12th Grade

13 Qs

Ethics, Privacy, and Information Security Quiz

Ethics, Privacy, and Information Security Quiz

Assessment

Quiz

Information Technology (IT)

12th Grade

Medium

Created by

KAWANG UTOMO

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of ethics in decision-making?

Principles of life

Wise Decision Making

Principles of right and wrong

Principles of left and right

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential threat to privacy in personal data storage?

Data anonymization

Data backups

Data aggregators

Data encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering?

SQL injection

Firewall breaches

Data encryption

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of risk management?

To eliminate all risks

To increase security

To train employee about risk

To identify, control, and minimize threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of risk mitigation strategy?

Risk acceptance

Risk limitation

Risk transference

Risk enhancement

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'vulnerability' refer to in information security?

The amount of data stored

The speed of data processing

The strength of a security system

The potential for a system to be attacked

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a deliberate threat to information systems?

Natural disasters

Human error

Identity theft

Social engineering

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?