8.3 Security of data (1)

8.3 Security of data (1)

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Security Risks

Security Risks

10th Grade

15 Qs

Year 10 Security Revision

Year 10 Security Revision

10th Grade

20 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

IGCSE ICT Chapter 8 - Safety & Security

IGCSE ICT Chapter 8 - Safety & Security

9th - 10th Grade

20 Qs

Security of Data-Phishing

Security of Data-Phishing

9th - 11th Grade

10 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Level 1 ICT: Security Quiz

Level 1 ICT: Security Quiz

12th Grade

12 Qs

8.3 Security of data (1)

8.3 Security of data (1)

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Kabila Maniraja

Used 7+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data threat?

A method to enhance data security

Anything that could harm or steal information

An encryption technique

None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a type of sensitive data?

Personal details

Secret business data

Gaming scores

Money information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for gaining unauthorized access to a computer system?

Hacking

Smishing

Phishing

Pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary tool hackers use for hacking?

Firewall

Internet

Antivirus

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT an effect of hacking?

Deleting data

Corrupting data

Identity theft

Increasing computer speed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can hacking be prevented?

By creating stronger passwords

By sharing passwords

By avoiding encryption

By clicking unknown links

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Redirecting a user to a fake website

Sending fraudulent emails to obtain sensitive data

Capturing keystrokes

None of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?