1) What is a hacker? a) A person who has computer or network skills and uses them to overcome system or network security. b) A person who is interested in exploring and learning about computer systems and networks. c) A person who specializes in computer and network security, hired to protect systems from cyber attacks. d) A person who uses his or her skills to harm others, such as stealing personal information or destroying data. 2) Why are hackers dangerous? a) They are people who specialize in protecting computer systems from cyber attacks b) They are people who are curious and like to explore computer systems c) They can steal personal information or destroy data d) They are people who work for governments or business organizations 3) What is Internet Security? a) Protect your computer from viruses or malware b) Protect users from online fraud c) Protect the network system from attacks d) Protect information and systems from unauthorized access, use, disclosure, alteration or destruction when using the internet 4) What is the goal of Internet Security? a) Protect the integrity, availability and confidentiality of information b) Protect user privacy c) Protect the network system from threats d) All of the above answers 5) What do internet security elements include? a) Strong password b) Firewall c) Anti-virus software d) All of the above answers 6) What is a firewall? a) A software or hardware system that controls network traffic b) A software or hardware system that prevents all unauthorized access c) A software or hardware system that encrypts all network traffic d) A software or hardware system that manages access rights for users 7) What is encryption? a) The process of converting data into an easily formatted readable form b) The process of converting data into a format that only authorized users can read c) The process of converting data into a format that is uniquely readable by someone new to decrypting the key d) The process of converting data into an unreadable format 8) What are the most internet security threats? a) Malware b) Phishing c) Ransomware d) Public Wifi e) All of the above answers 9) Which of the following types of cyberattacks typically uses spoofed emails to trick users into clicking on malicious links? a) Denial of service attack b) Phishing attacks c) Intrusion attack d) Public Wifi 10) How to protect data online? a) Password Power b) Secure Your Devices c) Be Wary of Phishing d) Practice Safe Browsing e) Secure Your Wi-Fi f) All of the above answers 11) A strong password needs to meet which of the following criteria? a) Must be at least 8 characters long b) Includes letters, numbers and special characters c) Should not contain personal information d) All three answers above 12) How to keep safe online? a) Sharing your personal information with strangers. b) Use strong and unique passwords for all your accounts. c) Downloading files or applications from untrusted sources. d) Not updating your security software.
0%
Internet Security
共有
共有
共有
Theanh110105
さんの投稿です
THCS
Tin học
コンテンツの編集
印刷
埋め込み
もっと見る
割り当て
リーダーボード
もっと表示する
表示を少なくする
このリーダーボードは現在非公開です。公開するには
共有
をクリックしてください。
このリーダーボードは、リソースの所有者によって無効にされています。
このリーダーボードは、あなたのオプションがリソースオーナーと異なるため、無効になっています。
オプションを元に戻す
クイズ
は自由形式のテンプレートです。リーダーボード用のスコアは生成されません。
ログインが必要です
表示スタイル
フォント
サブスクリプションが必要です
オプション
テンプレートを切り替える
すべてを表示
アクティビティを再生すると、より多くのフォーマットが表示されます。
オープン結果
リンクをコピー
QRコード
削除
自動保存:
を復元しますか?