Protecting Personal Data and Cyber Hygiene Practices

Protecting Personal Data and Cyber Hygiene Practices

University

6 Qs

quiz-placeholder

Similar activities

REVIEW TIME

REVIEW TIME

9th Grade - University

10 Qs

General ExpressJS Quiz

General ExpressJS Quiz

University

10 Qs

SQL PRE-ASSESSMENT (MOTIVATION)

SQL PRE-ASSESSMENT (MOTIVATION)

University

10 Qs

Power of AI Tools

Power of AI Tools

University

10 Qs

QUIZ-1 KELAS XI

QUIZ-1 KELAS XI

University

10 Qs

8th Social Media and Modern Communication Assessment

8th Social Media and Modern Communication Assessment

8th Grade - University

10 Qs

PT101: Quiz No. 1

PT101: Quiz No. 1

University

10 Qs

Module 2

Module 2

University

10 Qs

Protecting Personal Data and Cyber Hygiene Practices

Protecting Personal Data and Cyber Hygiene Practices

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Mae Mae

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most effective way to create and manage strong passwords?

Use simple phrases like "password123" for easy recall.

Reuse the same password across multiple accounts.

Use a mix of uppercase letters, numbers, and symbols, and store them in a password manager.

Write passwords on a sticky note attached to your monitor.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method provides the highest security for two-factor authentication (2FA)?

SMS-based codes.

Authentication apps like Google Authenticator.

Security questions about your pet’s name.

Skipping 2FA for convenience.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is regular software updating critical for cyber hygiene?

It improves device battery life.

It installs security patches to fix vulnerabilities.

It changes your IP address.

It increases internet speed.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How should you respond to an email requesting sensitive information?

Reply immediately with the details.

Click links to verify the sender’s website.

Contact the sender through a trusted channel to confirm legitimacy.

Forward the email to colleagues for advice.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best practice for protecting sensitive data?

Store it exclusively on unencrypted USB drives.

Encrypt it both in transit and at rest.

Share it publicly on social media.

Disable firewall settings for faster access.

6.

OPEN ENDED QUESTION

3 mins • 5 pts

Explain how basic cyber hygiene practices (e.g., strong passwords, software updates) contribute to preventing data breaches. Provide examples.

Evaluate responses using AI:

OFF