1) What is a hacker? a) A person who has computer or network skills and uses them to overcome system or network security. b) A person who is interested in exploring and learning about computer systems and networks. c) A person who specializes in computer and network security, hired to protect systems from cyber attacks. d) A person who uses his or her skills to harm others, such as stealing personal information or destroying data. 2) Why are hackers dangerous? a) They are people who specialize in protecting computer systems from cyber attacks b) They are people who are curious and like to explore computer systems c) They can steal personal information or destroy data d) They are people who work for governments or business organizations 3) What is Internet Security? a) Protect your computer from viruses or malware b) Protect users from online fraud c) Protect the network system from attacks d) Protect information and systems from unauthorized access, use, disclosure, alteration or destruction when using the internet 4) What is the goal of Internet Security? a) Protect the integrity, availability and confidentiality of information b) Protect user privacy c) Protect the network system from threats d) All of the above answers 5) What do internet security elements include? a) Strong password b) Firewall c) Anti-virus software d) All of the above answers 6) What is a firewall? a) A software or hardware system that controls network traffic b) A software or hardware system that prevents all unauthorized access c) A software or hardware system that encrypts all network traffic d) A software or hardware system that manages access rights for users 7) What is encryption? a) The process of converting data into an easily formatted readable form b) The process of converting data into a format that only authorized users can read c) The process of converting data into a format that is uniquely readable by someone new to decrypting the key d) The process of converting data into an unreadable format 8) What are the most internet security threats? a) Malware b) Phishing c) Ransomware d) Public Wifi e) All of the above answers 9) Which of the following types of cyberattacks typically uses spoofed emails to trick users into clicking on malicious links? a) Denial of service attack b) Phishing attacks c) Intrusion attack d) Public Wifi 10) How to protect data online? a) Password Power b) Secure Your Devices c) Be Wary of Phishing d) Practice Safe Browsing e) Secure Your Wi-Fi f) All of the above answers 11) A strong password needs to meet which of the following criteria? a) Must be at least 8 characters long b) Includes letters, numbers and special characters c) Should not contain personal information d) All three answers above 12) How to keep safe online? a) Sharing your personal information with strangers. b) Use strong and unique passwords for all your accounts. c) Downloading files or applications from untrusted sources. d) Not updating your security software.
0%
Internet Security
공유
공유
공유
만든이
Theanh110105
THCS
Tin học
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?