1) What is a hacker? a) A person who has computer or network skills and uses them to overcome system or network security. b) A person who is interested in exploring and learning about computer systems and networks. c) A person who specializes in computer and network security, hired to protect systems from cyber attacks. d) A person who uses his or her skills to harm others, such as stealing personal information or destroying data. 2) Why are hackers dangerous? a) They are people who specialize in protecting computer systems from cyber attacks b) They are people who are curious and like to explore computer systems c) They can steal personal information or destroy data d) They are people who work for governments or business organizations 3) What is Internet Security? a) Protect your computer from viruses or malware b) Protect users from online fraud c) Protect the network system from attacks d) Protect information and systems from unauthorized access, use, disclosure, alteration or destruction when using the internet 4) What is the goal of Internet Security? a) Protect the integrity, availability and confidentiality of information b) Protect user privacy c) Protect the network system from threats d) All of the above answers 5) What do internet security elements include? a) Strong password b) Firewall c) Anti-virus software d) All of the above answers 6) What is a firewall? a) A software or hardware system that controls network traffic b) A software or hardware system that prevents all unauthorized access c) A software or hardware system that encrypts all network traffic d) A software or hardware system that manages access rights for users 7) What is encryption? a) The process of converting data into an easily formatted readable form b) The process of converting data into a format that only authorized users can read c) The process of converting data into a format that is uniquely readable by someone new to decrypting the key d) The process of converting data into an unreadable format 8) What are the most internet security threats? a) Malware b) Phishing c) Ransomware d) Public Wifi e) All of the above answers 9) Which of the following types of cyberattacks typically uses spoofed emails to trick users into clicking on malicious links? a) Denial of service attack b) Phishing attacks c) Intrusion attack d) Public Wifi 10) How to protect data online? a) Password Power b) Secure Your Devices c) Be Wary of Phishing d) Practice Safe Browsing e) Secure Your Wi-Fi f) All of the above answers 11) A strong password needs to meet which of the following criteria? a) Must be at least 8 characters long b) Includes letters, numbers and special characters c) Should not contain personal information d) All three answers above 12) How to keep safe online? a) Sharing your personal information with strangers. b) Use strong and unique passwords for all your accounts. c) Downloading files or applications from untrusted sources. d) Not updating your security software.
0%
Internet Security
Delen
Delen
Delen
door
Theanh110105
THCS
Tin học
Inhoud Bewerken
Afdrukken
Embedden
Meer
Toewijzingen
Scorebord
Meer weergeven
Minder weergeven
Dit scoreboard is momenteel privé. Klik op
Delen
om het publiek te maken.
Dit scoreboard is uitgeschakeld door de eigenaar.
Dit scoreboard is uitgeschakeld omdat uw opties anders zijn dan die van de eigenaar.
Opties Herstellen
Quiz
is een open template. Het genereert geen scores voor een scoreboard.
Inloggen vereist
Visuele stijl
Lettertypen
Abonnement vereist
Opties
Template wisselen
Alles weergeven
Er zullen meer templates verschijnen terwijl je de activiteit gebruikt.
Open resultaten
Kopieer link
QR-code
Verwijderen
Automatisch opgeslagen activiteit "
" herstellen?