
ICT G5 Password security
Authored by Rania AlBaqary
Information Technology (IT)
5th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
one of the ways that computer hackers use to obtain passwords is called
digital footprint
create an account
phishing
protection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
you can identify phishing messages by the presence of
bad grammer
misspelling
request personal data
all of them
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Passwords should be
a- unique
b- strong
c- weak
both a and b
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
MFA is abbreviation for Multi-Factor Authentication
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Password manager software is used to create strong Passwords
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?