CPT C11 Security & Privacy

CPT C11 Security & Privacy

9th Grade

20 Qs

quiz-placeholder

Similar activities

Cybersecurity - Assessment Review - SGM #2

Cybersecurity - Assessment Review - SGM #2

9th Grade

20 Qs

ICS: Unit 3 Review

ICS: Unit 3 Review

9th Grade

15 Qs

Lesson 3: Impact of IT systems

Lesson 3: Impact of IT systems

9th - 12th Grade

15 Qs

Form 2 - Information Technology Quiz

Form 2 - Information Technology Quiz

8th Grade - University

25 Qs

Unit 2 The Internet

Unit 2 The Internet

9th - 12th Grade

18 Qs

YEAR 7 MID-TERM  ASSESSMENT

YEAR 7 MID-TERM ASSESSMENT

7th Grade - University

20 Qs

Unit 9 Exam (The Internet & Cybersecurity)

Unit 9 Exam (The Internet & Cybersecurity)

9th Grade

25 Qs

CPT C11 Security & Privacy

CPT C11 Security & Privacy

Assessment

Quiz

Information Technology (IT)

9th Grade

Easy

Created by

woai chemhepython

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are strong password practices?

Using at least 12 characters, including numbers and symbols

Writing passwords on a sticky note and keeping it near the computer

Using the same password for multiple account

Changing passwords regularly

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are effective measures to prevent phishing attacks?

Verifying the sender before clicking on email links

Using two-factor authentication (2FA)

Downloading attachments from unknown sources

Be wary of urgent emails asking for personal details

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are methods to ensure data privacy?

Encrypting sensitive files

Enabling firewall protection

Sharing passwords with trusted friends

Using Virtual Private Networks (VPNs) on public Wi-Fi

4.

MATCH QUESTION

1 min • 2 pts

Match each preventive measure with the most appropriate security threat.

Use encryption and VPN

Malware

Use an up-to-date antivirus

Phishing

Check email sources before clicking link

Unauthorized access

Enable two-factor authentication (2FA)

Data interception

5.

MATCH QUESTION

1 min • 1 pt

Match the function to the security feature.

Detects and removes malware

Firewall

Stores and encrypts login credentials

Password Manager

Prevents unauthorized network access

Antivirus Software

Converts data into unreadable format

Encryption

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The process of converting plain text into an unreadable format to protect sensitive information is called _____________.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

To prevent unauthorized access to a system, users should enable _________________, which requires an additional verification step beyond a password.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?