Technoshield

Technoshield

University

10 Qs

quiz-placeholder

Similar activities

Marco de Referencia de la Competencia Digital Docente

Marco de Referencia de la Competencia Digital Docente

University

10 Qs

Testează-ți cunoștințele despre numerație

Testează-ți cunoștințele despre numerație

11th Grade - University

15 Qs

MOTORES PASO A PASO Y ARDUINO

MOTORES PASO A PASO Y ARDUINO

University

10 Qs

CONCEPTOS ARDUINO

CONCEPTOS ARDUINO

1st Grade - University

10 Qs

DSA (QUIZ 3) - Recursion

DSA (QUIZ 3) - Recursion

University

15 Qs

CHAPTER 6: SYSTEM ANALYSIS AND DESIGN

CHAPTER 6: SYSTEM ANALYSIS AND DESIGN

University

14 Qs

Technoshield

Technoshield

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

AHMAD SHAQIL NAJIY BIN AHMAD MAHMUD .

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a privacy concern?

Accuracy

Property

Encryption

Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which example describes a "data broker"?

A bank officer approving your loan

A company selling your purchase history to marketers

A hacker stealing your password

A friend sharing your contact number without permission

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Once information is posted on social media, it is no longer _______?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which is a common sign of a rouge Wi-Fi hotspot?

It asks you to create a strong password

It has a similar name to a legit hotspot

It requires biometric login

It is only available in secure government buildings

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is NOT a type of malware?

Ransomeware

Phishing

Spyware

Trojan Horse

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Before entering the login details, check the website's ______ and verify

the security phrase / image

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A DDoS attack uses:

A computer flooding the target with traffic

Many devices in a botnet flooding the target

Malware that steals credit card details

Fake websites to capture login credentials

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?