Search Header Logo

CPT C11 Security & Privacy

Authored by woai chemhepython

Information Technology (IT)

9th Grade

Used 3+ times

CPT C11 Security & Privacy
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are strong password practices?

Using at least 12 characters, including numbers and symbols

Writing passwords on a sticky note and keeping it near the computer

Using the same password for multiple account

Changing passwords regularly

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are effective measures to prevent phishing attacks?

Verifying the sender before clicking on email links

Using two-factor authentication (2FA)

Downloading attachments from unknown sources

Be wary of urgent emails asking for personal details

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are methods to ensure data privacy?

Encrypting sensitive files

Enabling firewall protection

Sharing passwords with trusted friends

Using Virtual Private Networks (VPNs) on public Wi-Fi

4.

MATCH QUESTION

1 min • 2 pts

Match each preventive measure with the most appropriate security threat.

Use encryption and VPN

Data interception

Enable two-factor authentication (2FA)

Phishing

Check email sources before clicking link

Unauthorized access

Use an up-to-date antivirus

Malware

5.

MATCH QUESTION

1 min • 1 pt

Match the function to the security feature.

Stores and encrypts login credentials

Firewall

Converts data into unreadable format

Encryption

Prevents unauthorized network access

Antivirus Software

Detects and removes malware

Password Manager

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The process of converting plain text into an unreadable format to protect sensitive information is called _____________.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

To prevent unauthorized access to a system, users should enable _________________, which requires an additional verification step beyond a password.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?