CodeHS Cybersecurity-and-You-Quiz

CodeHS Cybersecurity-and-You-Quiz

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Digital Technology Unit 1 Revision

Digital Technology Unit 1 Revision

10th Grade

20 Qs

Soal STS TIK Kelas 5 Semester 2

Soal STS TIK Kelas 5 Semester 2

5th Grade - University

20 Qs

Lesson 3: Equal Access

Lesson 3: Equal Access

9th - 12th Grade

15 Qs

Soal Desain dan Simulasi jaringan Komputer berbasis AI

Soal Desain dan Simulasi jaringan Komputer berbasis AI

11th Grade

20 Qs

Latihan Soal PSAS Informatika 11

Latihan Soal PSAS Informatika 11

11th Grade

20 Qs

Meningkatkan Keamanan Informasi

Meningkatkan Keamanan Informasi

9th Grade

20 Qs

Uji Pengetahuan Informatika

Uji Pengetahuan Informatika

9th Grade

20 Qs

Unit 3 - Year 11 - Controlled Exam revision

Unit 3 - Year 11 - Controlled Exam revision

11th Grade

18 Qs

CodeHS Cybersecurity-and-You-Quiz

CodeHS Cybersecurity-and-You-Quiz

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Hard

Created by

Cynthia Harrison

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords would be considered the most secure according to current best practices for password creation (including length, complexity, and unpredictability)?

c00kIessphynxClo$ure104!@#

2ldj3#0Fsjsl

$mO0thi3!

sLoganDeem

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios best demonstrates the enhanced security provided by two-factor authentication (2FA)?

A user logs in with only a password, which is stored in a secure password manager.

A user logs in using a password and a code sent to their mobile device, making it harder for attackers to gain access even if the password is compromised.

A user logs in with a biometric scan, which is stored locally on their device.

A user logs in with a password, and all data is encrypted during transmission.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a key distinction between the GDPR and the CCPA in their approach to protecting consumer privacy rights?

The GDPR applies only to companies based in the EU, while the CCPA applies globally

The GDPR grants consumers the right to data portability, while the CCPA primarily focuses on the right to opt out of data sales

The CCPA enforces stricter penalties for non-compliance than the GDPR

Both laws require companies to delete all consumer data upon request, without exception

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While evaluating the credibility of a news article shared on social media, you want to apply advanced critical thinking skills. Which of the following strategies would LEAST contribute to a thorough assessment of the article's legitimacy?

Investigate the article's source by cross-referencing it with reputable fact-checking organizations and media watchdogs.

Focus primarily on whether the article aligns with your personal beliefs and opinions.

Analyze the article for logical fallacies, emotional language, or unsupported claims.

Examine the presence and credibility of cited data, expert opinions, and references within the article.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the primary function of a Creative Commons license in the context of intellectual property law?

It automatically transfers all rights to the public domain, removing all copyright protections.

It allows creators to bypass copyright law and use any work without attribution or permission.

It enables creators to publish their work exclusively on their own platforms, restricting access elsewhere.

It provides a legal framework for creators to specify which rights they reserve and which rights they waive, allowing others to use their work under defined conditions.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following hackers is most likely to exploit vulnerabilities for personal gain without authorization, often causing harm to systems or data?

Bug bounty hunter

Penetration tester

Black hat hacker

White hat hacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Read the following excerpt about X's (formerly Twitter) privacy policy. Based on the excerpt, which of the following data does X explicitly state it collects?

Posts and other content you post (including the date, application, and version of X) and information about your broadcast activity (e.g., Spaces), including broadcasts you’ve created and when you created them, your lists, bookmarks, and communities you are a part of.

Your interactions with other users’ content, such as reposts, likes, bookmarks, shares, replies, if other users mention or tag you in content or if you mention or tag them, and broadcasts you’ve participated in (including your viewing history, listening, commenting, speaking, and reacting).

How you interact with others on the platform, such as people you follow and people who follow you, metadata related to Encrypted Messages, and when you use Direct Messages, including the contents of the messages, the recipients, and date and time of messages.

If you communicate with us, such as through email, we will collect information about the communication and its content.

We collect information on links you interact with across our services (including in our emails sent to you).

Your device's unique hardware identifier

Content of direct messages

Your IP address

Your location when you post content

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?