[Inf] U19.1 (Inet security; vocabulary)
Quiz by Irina
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
15 questions
Show answers
- Q1The great majority of non-employees who .... against business will live in the immediate area.perform theftscommit crimesmake wrongdoings30s
- Q2We had to ... the house as we had lost the key.break intorobsteal30s
- Q3The alarm emits infra-red rays which are used to detect any ... .virushackerintruder30s
- Q4Smartphones have become ubiquitous, leading to a barrage of ways that they .... .violate your privacybreak your securityinfringe your safety30s
- Q5Every single picture you take has the potential to ... where you’ve been and where you often go.openrevealuncover30s
- Q6Any app that you ... your photos can harvest locations from them.make to accesslet to accessallow to access30s
- Q7You should know how app permissions can ...damage your informationcompromise your privacy.harm your security30s
- Q8When apps want to use ... like your location or microphone, you must grant permission first.feed dataimpersonal datasensitive information30s
- Q9You can shield yourself from many of dangers by using a VPN, but they’re oftentimes ... on these networks.preventedblockedcancelled30s
- Q10.... , check out ways to protect your privacy on Android and settings to boost iPhone privacy.To defendTo be awareTo take action30s
- Q11... is between the Intranet and the Internet networks.FirewallEncryptionKeylogger30s
- Q12I wouldn't dream of letting ... look after my own grandmother!crackersstrangersintruders30s
- Q13She gloved her hands to .... them .... the chemicals.ensure ... inprotect ... fromblock ... out of30s
- Q14Hackers constantly look for new ways to .... , but their favorite distribution method is one of the oldest: unsolicited email.corrupt your hard drivespread virusesinfiltrate the Internet30s
- Q15We promise that uture versions will be fully .... with the industry standard, don't worry.incompatiblecompliantrepilicated30s