CodeHS Cybersecurity-and-You-Quiz

Quiz
•
Information Technology (IT)
•
9th - 12th Grade
•
Hard
Cynthia Harrison
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following passwords would be considered the most secure according to current best practices for password creation (including length, complexity, and unpredictability)?
c00kIessphynxClo$ure104!@#
2ldj3#0Fsjsl
$mO0thi3!
sLoganDeem
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios best demonstrates the enhanced security provided by two-factor authentication (2FA)?
A user logs in with only a password, which is stored in a secure password manager.
A user logs in using a password and a code sent to their mobile device, making it harder for attackers to gain access even if the password is compromised.
A user logs in with a biometric scan, which is stored locally on their device.
A user logs in with a password, and all data is encrypted during transmission.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a key distinction between the GDPR and the CCPA in their approach to protecting consumer privacy rights?
The GDPR applies only to companies based in the EU, while the CCPA applies globally
The GDPR grants consumers the right to data portability, while the CCPA primarily focuses on the right to opt out of data sales
The CCPA enforces stricter penalties for non-compliance than the GDPR
Both laws require companies to delete all consumer data upon request, without exception
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While evaluating the credibility of a news article shared on social media, you want to apply advanced critical thinking skills. Which of the following strategies would LEAST contribute to a thorough assessment of the article's legitimacy?
Investigate the article's source by cross-referencing it with reputable fact-checking organizations and media watchdogs.
Focus primarily on whether the article aligns with your personal beliefs and opinions.
Analyze the article for logical fallacies, emotional language, or unsupported claims.
Examine the presence and credibility of cited data, expert opinions, and references within the article.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the primary function of a Creative Commons license in the context of intellectual property law?
It automatically transfers all rights to the public domain, removing all copyright protections.
It allows creators to bypass copyright law and use any work without attribution or permission.
It enables creators to publish their work exclusively on their own platforms, restricting access elsewhere.
It provides a legal framework for creators to specify which rights they reserve and which rights they waive, allowing others to use their work under defined conditions.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following hackers is most likely to exploit vulnerabilities for personal gain without authorization, often causing harm to systems or data?
Bug bounty hunter
Penetration tester
Black hat hacker
White hat hacker
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Read the following excerpt about X's (formerly Twitter) privacy policy. Based on the excerpt, which of the following data does X explicitly state it collects?
Posts and other content you post (including the date, application, and version of X) and information about your broadcast activity (e.g., Spaces), including broadcasts you’ve created and when you created them, your lists, bookmarks, and communities you are a part of.
Your interactions with other users’ content, such as reposts, likes, bookmarks, shares, replies, if other users mention or tag you in content or if you mention or tag them, and broadcasts you’ve participated in (including your viewing history, listening, commenting, speaking, and reacting).
How you interact with others on the platform, such as people you follow and people who follow you, metadata related to Encrypted Messages, and when you use Direct Messages, including the contents of the messages, the recipients, and date and time of messages.
If you communicate with us, such as through email, we will collect information about the communication and its content.
We collect information on links you interact with across our services (including in our emails sent to you).
Your device's unique hardware identifier
Content of direct messages
Your IP address
Your location when you post content
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Network Hardware & Components Quiz

Quiz
•
9th Grade
10 questions
Post Test (JKI)

Quiz
•
10th Grade - University
16 questions
Dampak Sosial Informatika

Quiz
•
9th Grade - University
10 questions
LUYỆN TẬP BÀI 2: THIẾT BỊ MẠNG

Quiz
•
12th Grade
10 questions
CIP Task 212 - Install & Configure Printers/Multifunction Device

Quiz
•
12th Grade
16 questions
untitled

Quiz
•
10th Grade - University
20 questions
Assessment Jaringan Komputer

Quiz
•
11th Grade
20 questions
Keterampilan Informatika Kelas 9

Quiz
•
9th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Appointment Passes Review

Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
Grammar Review

Quiz
•
6th - 9th Grade
Discover more resources for Information Technology (IT)
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
20 questions
Lab Safety and Lab Equipment

Quiz
•
9th - 12th Grade
20 questions
Grammar Review

Quiz
•
6th - 9th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
24 questions
Scientific method and variables review

Quiz
•
9th Grade
20 questions
Getting to know YOU icebreaker activity!

Quiz
•
6th - 12th Grade
6 questions
Secondary Safety Quiz

Lesson
•
9th - 12th Grade
20 questions
Biomolecules

Quiz
•
9th Grade