placeholder image to represent content

[Inf] U19.1 (Inet security; vocabulary)

Quiz by Irina

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
15 questions
Show answers
  • Q1
    The great majority of non-employees who .... against business will live in the immediate area.
    perform thefts
    commit crimes
    make wrongdoings
    30s
  • Q2
    We had to ... the house as we had lost the key.
    break into
    rob
    steal
    30s
  • Q3
    The alarm emits infra-red rays which are used to detect any ... .
    virus
    hacker
    intruder
    30s
  • Q4
    Smartphones have become ubiquitous, leading to a barrage of ways that they .... .
    violate your privacy
    break your security
    infringe your safety
    30s
  • Q5
    Every single picture you take has the potential to ... where you’ve been and where you often go.
    open
    reveal
    uncover
    30s
  • Q6
    Any app that you ... your photos can harvest locations from them.
    make to access
    let to access
    allow to access
    30s
  • Q7
    You should know how app permissions can ...
    damage your information
    compromise your privacy.
    harm your security
    30s
  • Q8
    When apps want to use ... like your location or microphone, you must grant permission first.
    feed data
    impersonal data
    sensitive information
    30s
  • Q9
    You can shield yourself from many of dangers by using a VPN, but they’re oftentimes ... on these networks.
    prevented
    blocked
    cancelled
    30s
  • Q10
    .... , check out ways to protect your privacy on Android and settings to boost iPhone privacy.
    To defend
    To be aware
    To take action
    30s
  • Q11
    ... is between the Intranet and the Internet networks.
    Firewall
    Encryption
    Keylogger
    30s
  • Q12
    I wouldn't dream of letting ... look after my own grandmother!
    crackers
    strangers
    intruders
    30s
  • Q13
    She gloved her hands to .... them .... the chemicals.
    ensure ... in
    protect ... from
    block ... out of
    30s
  • Q14
    Hackers constantly look for new ways to .... , but their favorite distribution method is one of the oldest: unsolicited email.
    corrupt your hard drive
    spread viruses
    infiltrate the Internet
    30s
  • Q15
    We promise that uture versions will be fully .... with the industry standard, don't worry.
    incompatible
    compliant
    repilicated
    30s

Teachers give this quiz to your class