
Digital Literacy
Quiz by Cardelia Brewer
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
What is the primary purpose of cybersecurity measures?
To organize data files
To improve computer performance
To increase network speed
To protect digital assets from unauthorized access
30s - Q2
Which of the following is NOT considered a digital asset?
Networks
Applications
Security guards
Data
30s - Q3
What is the main function of a firewall?
To monitor network traffic
To block unauthorized access while allowing outward communication
To detect computer viruses
To encrypt all data
30s - Q4
In the CIA triad model, what does 'integrity' refer to?
The assurance that information is trustworthy
The ability to access information quickly.
The encryption of sensitive data.
The protection of data from theft.
30s - Q5
Which type of security measure would be most appropriate for preventing unauthorized physical access to a building?
SIEM systems
Access control systems
Firewall configuration
Antivirus software
30s - Q6
What is the primary difference between data and information?
Data is unorganized figures while information has been organized to have meaning.
Data is organized figures while information is unorganized.
Data is always digital while information is always physical.
There is no difference between data and information.
30s - Q7
What is spyware?
Software that protects against viruses.
Software that encrypts user files.
Software that secretly transmit user information.
Software that displays unwanted advertisement.
30s - Q8
Which of the following is a characteristic of white hat hackers?
They break into systems for malicious purposes.
They search for system vulnerabilities to fix them.
They demand ransom for stolen data.
They hack for political causes.
30s - Q9
What is the main purpose of SIEM technology?
To support threat detection and security incident management.
To encrypt all company data.
To control physical access to buildings.
To block all incoming network traffic.
30s - Q10
What type of security threat involves pretending to be a legitimate entity to steal credentials?
Phishing
Adware
Ransomware
Malware
30s - Q11
Which Creative Commons license allows both commercial use and modifications?
CC BY-ND
CC BY
CC BY-NC-ND
CC BY-NC
30s - Q12
What is the primary goal of physical security measures?
To improve network security.
To prevent unauthorized access and theft of physical assets.
To protect digital assets only.
To manage digital data.
30s - Q13
What is software piracy?
Unauthorized copying or distribution of copyrighted software
Installing antivirus software
Creating new software programs
Sharing open-source programs
30s - Q14
Which of the following is an example of an Internet of Things (IoT) device?
A traditional analog watch
A basic calculator
A smart refrigerator
A printed manual
30s - Q15
What is ransomware?
Software that blocks system access until payment is made.
Software that monitors network traffic.
Software that protects against viruses.
Software that shows advertisements.
30s