placeholder image to represent content

Module 5: Digital Security, Ethics, and Privacy_ Mini Review

Quiz by Cardelia Brewer

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1

    What is true about CAPTCHAs?

    A person has the option to generate a net CAPTCHA.

    CATCHPAs were developed to verify input is coming from humans, not computer programs.

    All of the responses are correct.

    A CAPTCHA is an image containing a series of distorted characters.

    The CAPTCHA text can be read aloud for visually impaired users.

    30s
  • Q2

    What is the discovery , collection, and analysis of evidence found on computers and/or networks?

    digital media

    digital forensics

    digital memory

    digital portfolio

    30s
  • Q3

    How can a person's live speech be compared to their speech pattern?

    By using a voice verification system

    By using a gesture recognition system

    By using a iris recognition system

    By using a pattern verification system

    30s
  • Q4

    What is a private combination of words associated with a user name that allows access to certain computer resources?

    passcode

    ID

    passphrase

    personal identification

    30s
  • Q5

    What is a private combination of characters associated with a user name that allows access to certain computer resources?

    passcode

    password

    passphrase

    personal identification

    30s
  • Q6

    How can a person access a computer, device, or network?

    By using a security measure called access device

    By using a security measure called access point

    By using a security measure called access area

    By using a security measure called access control

    30s
  • Q7

    What performs a repetitive task on a network?

    zombie army

    worm

    bot

    botnet

    30s
  • Q8

    How can a person be tricked into believing that an Internet Protocol address is associated with a trusted source?

    By cybercrimes

    By a recognition systems

    By Email spoofing

    By Internet Protocol spoofing

    30s
  • Q9

    How can a person protect their computer from unauthorized access?

    by using a shield

    by using firewalls

    by using blockers

    by using a backdoor

    30s
  • Q10

    What is placed on a computer without the user's knowledge that secretly collects information about a user?

    rootkit

    trojan horse

    spyware

    adware

    30s

Teachers give this quiz to your class