Search Header Logo

CodeHS Cybersecurity-and-You-Quiz

Authored by Cynthia Harrison

Information Technology (IT)

9th - 12th Grade

Used 1+ times

CodeHS Cybersecurity-and-You-Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords would be considered the most secure according to current best practices for password creation (including length, complexity, and unpredictability)?

c00kIessphynxClo$ure104!@#

2ldj3#0Fsjsl

$mO0thi3!

sLoganDeem

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios best demonstrates the enhanced security provided by two-factor authentication (2FA)?

A user logs in with only a password, which is stored in a secure password manager.

A user logs in using a password and a code sent to their mobile device, making it harder for attackers to gain access even if the password is compromised.

A user logs in with a biometric scan, which is stored locally on their device.

A user logs in with a password, and all data is encrypted during transmission.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a key distinction between the GDPR and the CCPA in their approach to protecting consumer privacy rights?

The GDPR applies only to companies based in the EU, while the CCPA applies globally

The GDPR grants consumers the right to data portability, while the CCPA primarily focuses on the right to opt out of data sales

The CCPA enforces stricter penalties for non-compliance than the GDPR

Both laws require companies to delete all consumer data upon request, without exception

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While evaluating the credibility of a news article shared on social media, you want to apply advanced critical thinking skills. Which of the following strategies would LEAST contribute to a thorough assessment of the article's legitimacy?

Investigate the article's source by cross-referencing it with reputable fact-checking organizations and media watchdogs.

Focus primarily on whether the article aligns with your personal beliefs and opinions.

Analyze the article for logical fallacies, emotional language, or unsupported claims.

Examine the presence and credibility of cited data, expert opinions, and references within the article.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the primary function of a Creative Commons license in the context of intellectual property law?

It automatically transfers all rights to the public domain, removing all copyright protections.

It allows creators to bypass copyright law and use any work without attribution or permission.

It enables creators to publish their work exclusively on their own platforms, restricting access elsewhere.

It provides a legal framework for creators to specify which rights they reserve and which rights they waive, allowing others to use their work under defined conditions.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following hackers is most likely to exploit vulnerabilities for personal gain without authorization, often causing harm to systems or data?

Bug bounty hunter

Penetration tester

Black hat hacker

White hat hacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Read the following excerpt about X's (formerly Twitter) privacy policy. Based on the excerpt, which of the following data does X explicitly state it collects?

Posts and other content you post (including the date, application, and version of X) and information about your broadcast activity (e.g., Spaces), including broadcasts you’ve created and when you created them, your lists, bookmarks, and communities you are a part of.

Your interactions with other users’ content, such as reposts, likes, bookmarks, shares, replies, if other users mention or tag you in content or if you mention or tag them, and broadcasts you’ve participated in (including your viewing history, listening, commenting, speaking, and reacting).

How you interact with others on the platform, such as people you follow and people who follow you, metadata related to Encrypted Messages, and when you use Direct Messages, including the contents of the messages, the recipients, and date and time of messages.

If you communicate with us, such as through email, we will collect information about the communication and its content.

We collect information on links you interact with across our services (including in our emails sent to you).

Your device's unique hardware identifier

Content of direct messages

Your IP address

Your location when you post content

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?