
Technoshield
Authored by AHMAD SHAQIL NAJIY BIN AHMAD MAHMUD .
Information Technology (IT)
University
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT considered a privacy concern?
Accuracy
Property
Encryption
Access
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which example describes a "data broker"?
A bank officer approving your loan
A company selling your purchase history to marketers
A hacker stealing your password
A friend sharing your contact number without permission
3.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Once information is posted on social media, it is no longer (a) ?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is a common sign of a rouge Wi-Fi hotspot?
It asks you to create a strong password
It has a similar name to a legit hotspot
It requires biometric login
It is only available in secure government buildings
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of malware?
Ransomeware
Phishing
Spyware
Trojan Horse
6.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Before entering the login details, check the website's (a) and verify
the security phrase / image
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A DDoS attack uses:
A computer flooding the target with traffic
Many devices in a botnet flooding the target
Malware that steals credit card details
Fake websites to capture login credentials
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?