8.3 Security of data (1)

8.3 Security of data (1)

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

Security risk (Grade 11 IGCSE)

Security risk (Grade 11 IGCSE)

10th - 11th Grade

14 Qs

IGCSE ICT Chapter 8 - Safety & Security

IGCSE ICT Chapter 8 - Safety & Security

9th - 10th Grade

20 Qs

IGCSE Chapter 8 - Safety & Security

IGCSE Chapter 8 - Safety & Security

11th Grade

12 Qs

eSecurity

eSecurity

11th Grade

10 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Technical Terms - Internet (A-Z) - Smishing

Technical Terms - Internet (A-Z) - Smishing

12th Grade

10 Qs

8.3 Security of data (1)

8.3 Security of data (1)

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Kabila Maniraja

Used 7+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data threat?

A method to enhance data security

Anything that could harm or steal information

An encryption technique

None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a type of sensitive data?

Personal details

Secret business data

Gaming scores

Money information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for gaining unauthorized access to a computer system?

Hacking

Smishing

Phishing

Pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary tool hackers use for hacking?

Firewall

Internet

Antivirus

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT an effect of hacking?

Deleting data

Corrupting data

Identity theft

Increasing computer speed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can hacking be prevented?

By creating stronger passwords

By sharing passwords

By avoiding encryption

By clicking unknown links

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Redirecting a user to a fake website

Sending fraudulent emails to obtain sensitive data

Capturing keystrokes

None of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?