Protecting Personal Data and Cyber Hygiene Practices

Protecting Personal Data and Cyber Hygiene Practices

University

6 Qs

quiz-placeholder

Similar activities

digital security and privacy

digital security and privacy

University

8 Qs

Ethical Hacking week #1

Ethical Hacking week #1

University

10 Qs

Digital Footprint

Digital Footprint

5th Grade - University

11 Qs

Cloud Computing and web services Practice Quizes

Cloud Computing and web services Practice Quizes

University

10 Qs

ALFABETIZACION DIGITAL GRUPO 7

ALFABETIZACION DIGITAL GRUPO 7

University

10 Qs

QUIZ 3: SECURITY TOOLS and  VULNERABILITY ANALYSIS

QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

University

11 Qs

POS TES

POS TES

9th Grade - University

10 Qs

Keamanan akun dan serangan cyber

Keamanan akun dan serangan cyber

University

10 Qs

Protecting Personal Data and Cyber Hygiene Practices

Protecting Personal Data and Cyber Hygiene Practices

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Mae Mae

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most effective way to create and manage strong passwords?

Use simple phrases like "password123" for easy recall.

Reuse the same password across multiple accounts.

Use a mix of uppercase letters, numbers, and symbols, and store them in a password manager.

Write passwords on a sticky note attached to your monitor.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method provides the highest security for two-factor authentication (2FA)?

SMS-based codes.

Authentication apps like Google Authenticator.

Security questions about your pet’s name.

Skipping 2FA for convenience.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is regular software updating critical for cyber hygiene?

It improves device battery life.

It installs security patches to fix vulnerabilities.

It changes your IP address.

It increases internet speed.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How should you respond to an email requesting sensitive information?

Reply immediately with the details.

Click links to verify the sender’s website.

Contact the sender through a trusted channel to confirm legitimacy.

Forward the email to colleagues for advice.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best practice for protecting sensitive data?

Store it exclusively on unencrypted USB drives.

Encrypt it both in transit and at rest.

Share it publicly on social media.

Disable firewall settings for faster access.

6.

OPEN ENDED QUESTION

3 mins • 5 pts

Explain how basic cyber hygiene practices (e.g., strong passwords, software updates) contribute to preventing data breaches. Provide examples.

Evaluate responses using AI:

OFF

Discover more resources for Information Technology (IT)