
Podstawy Cyberbezpieczeństwa
Authored by Wojciech Mazurczyk
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine Maya is on a secret mission to send a top-secret message to her best buddy Avery. To make sure that nosy parkers can't snoop on their conversation, she decides to use a special method to keep her message safe. Can you tell us what encryption is and where it can be used?
Encryption is the process of accelerating data.
Encryption is a technique for creating data backups.
Encryption is the process of securing data by transforming it into an unreadable form, used in data protection and communication.
Encryption is only used in computer games.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hey there, savvy password protector! What are the best practices for keeping your passwords safe and sound?
Using simple passwords
Using strong passwords and password managers. Just like Charlotte does!
Writing passwords on a piece of paper
Using the same password for all accounts, just like Elijah thinks is a good idea!
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine Avery, a tech-savvy office manager, is on a mission to set up a brand new office network. She knows that keeping it secure is super important! What fun and essential principles of network security should she follow to keep her digital fortress safe?
Strong passwords, regular software updates, robust firewalls, data encryption, and educating users about security.
Opening unknown attachments like a mystery box!
Using simple passwords that are easy to guess.
Skipping software updates because they take too long.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During an exciting cybersecurity seminar, our enthusiastic speaker, Ethan, dives into the world of digital dangers! He turns to the audience and asks, "Can you name the most common types of malware that threaten our computer systems?"
firewall
backup software
antivirus
Viruses, worms, trojans, ransomware, spyware, adware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hey there, savvy internet user! How can you spot those sneaky phishing attempts and protect yourself from them? Let's help our friends Lily, Maya, and Abigail stay safe online!
Phishing can be recognized by the colorful background of the message.
Recognize phishing through suspicious messages and defend yourself by verifying the sender, avoiding links in unknown messages, and using two-factor authentication.
Always click on links that seem familiar.
It is best to ignore all email messages.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Meet Harper, the savvy data protection officer at a cutting-edge tech company! She's on a mission to ensure that her company is a champion of personal data privacy protection. Can you help her identify the key principles she must follow to keep everyone's data safe and sound?
The principles of personal data privacy protection include consent, data minimization, purpose limitation, accuracy, storage limitation, integrity and confidentiality, and the right to access and deletion.
There are no restrictions on the storage of personal data.
All personal data must be public.
The principles of personal data privacy protection are not necessary.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it super important for our friend Noah to use two-step verification for his online banking account?
Two-step verification is only for business accounts.
Two-step verification boosts account security like a superhero cape!
Two-step verification does not affect security.
Two-step verification takes forever and a day.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
7 questions
Data mining-Clustering-1
Quiz
•
University
15 questions
GIS Unit III
Quiz
•
University
15 questions
Computer and Other Human Inventions
Quiz
•
University
15 questions
Robotics Prelim
Quiz
•
University
10 questions
Constrain Satisfaction Problem (CSP)
Quiz
•
University
11 questions
SCM and Logistics
Quiz
•
University
10 questions
UTILITY PROGRAM
Quiz
•
University
10 questions
Data Warehouse - Foundations
Quiz
•
University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University