1) What is a hacker? a) A person who has computer or network skills and uses them to overcome system or network security. b) A person who is interested in exploring and learning about computer systems and networks. c) A person who specializes in computer and network security, hired to protect systems from cyber attacks. d) A person who uses his or her skills to harm others, such as stealing personal information or destroying data. 2) Why are hackers dangerous? a) They are people who specialize in protecting computer systems from cyber attacks b) They are people who are curious and like to explore computer systems c) They can steal personal information or destroy data d) They are people who work for governments or business organizations 3) What is Internet Security? a) Protect your computer from viruses or malware b) Protect users from online fraud c) Protect the network system from attacks d) Protect information and systems from unauthorized access, use, disclosure, alteration or destruction when using the internet 4) What is the goal of Internet Security? a) Protect the integrity, availability and confidentiality of information b) Protect user privacy c) Protect the network system from threats d) All of the above answers 5) What do internet security elements include? a) Strong password b) Firewall c) Anti-virus software d) All of the above answers 6) What is a firewall? a) A software or hardware system that controls network traffic b) A software or hardware system that prevents all unauthorized access c) A software or hardware system that encrypts all network traffic d) A software or hardware system that manages access rights for users 7) What is encryption? a) The process of converting data into an easily formatted readable form b) The process of converting data into a format that only authorized users can read c) The process of converting data into a format that is uniquely readable by someone new to decrypting the key d) The process of converting data into an unreadable format 8) What are the most internet security threats? a) Malware b) Phishing c) Ransomware d) Public Wifi e) All of the above answers 9) Which of the following types of cyberattacks typically uses spoofed emails to trick users into clicking on malicious links? a) Denial of service attack b) Phishing attacks c) Intrusion attack d) Public Wifi 10) How to protect data online? a) Password Power b) Secure Your Devices c) Be Wary of Phishing d) Practice Safe Browsing e) Secure Your Wi-Fi f) All of the above answers 11) A strong password needs to meet which of the following criteria? a) Must be at least 8 characters long b) Includes letters, numbers and special characters c) Should not contain personal information d) All three answers above 12) How to keep safe online? a) Sharing your personal information with strangers. b) Use strong and unique passwords for all your accounts. c) Downloading files or applications from untrusted sources. d) Not updating your security software.
0%
Internet Security
共享
共享
共享
由
Theanh110105
THCS
Tin học
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
随堂测验
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?