
Understanding Data Threats and Protection
Authored by Nahed Alsalah
Information Technology (IT)
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is hacking and how can it affect data security?
Hacking is a method of improving data security by identifying vulnerabilities.
Hacking is unauthorized access to systems that can compromise data security by leading to data breaches and loss of sensitive information.
Hacking is a type of software that protects data from breaches.
Hacking refers to the legal access of systems to enhance performance.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
List three measures to protect data from hacking.
Use public Wi-Fi for sensitive transactions.
Share passwords with colleagues for convenience.
Disable all security software to improve performance.
1. Implement strong password policies. 2. Use encryption for sensitive data. 3. Regularly update software.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Define phishing and provide an example of how it works.
Phishing is a type of fishing that uses nets to catch fish.
Phishing involves sending physical letters to steal personal information.
An example of phishing is an email that looks like it's from a bank, asking the recipient to verify their account information by clicking on a link that leads to a fake website designed to steal their credentials.
An example of phishing is a phone call asking for your social security number.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is pharming and how does it differ from phishing?
Pharming and phishing are the same thing, both targeting email accounts.
Pharming redirects users to fraudulent websites, while phishing tricks users into providing information.
Pharming is a type of malware that infects computers.
Phishing involves redirecting users to legitimate websites.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Explain smishing and its potential impact on individuals.
Smishing refers to the use of email to steal personal data.
Smishing is a secure method of sending financial information via SMS.
Smishing is a type of malware that infects mobile devices.
Smishing is a phishing attack conducted through SMS, posing risks like identity theft and financial loss.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is vishing and what methods can be used to prevent it?
Vishing is a type of phishing attack conducted via phone calls, and prevention methods include education, caller verification, and strict information-sharing policies.
Preventing vishing involves ignoring all phone calls from unknown numbers.
Vishing is a type of email scam that uses fake websites.
Vishing is a method of stealing passwords through text messages.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describe the characteristics of viruses and how they can infect a computer.
Viruses are self-replicating malicious software that infect computers by attaching to files or programs, spreading through downloads, email attachments, or compromised websites.
Viruses are physical devices that need to be plugged into a computer to work.
Viruses can only infect mobile devices through SMS messages.
Viruses are harmless programs that enhance computer performance.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?