Module 5: Digital Security, Ethics, and Privacy_ Mini Review
Quiz by Cardelia Brewer
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
What is true about CAPTCHAs?
A person has the option to generate a net CAPTCHA.
CATCHPAs were developed to verify input is coming from humans, not computer programs.
All of the responses are correct.
A CAPTCHA is an image containing a series of distorted characters.
The CAPTCHA text can be read aloud for visually impaired users.
30s - Q2
What is the discovery , collection, and analysis of evidence found on computers and/or networks?
digital media
digital forensics
digital memory
digital portfolio
30s - Q3
How can a person's live speech be compared to their speech pattern?
By using a voice verification system
By using a gesture recognition system
By using a iris recognition system
By using a pattern verification system
30s - Q4
What is a private combination of words associated with a user name that allows access to certain computer resources?
passcode
ID
passphrase
personal identification
30s - Q5
What is a private combination of characters associated with a user name that allows access to certain computer resources?
passcode
password
passphrase
personal identification
30s - Q6
How can a person access a computer, device, or network?
By using a security measure called access device
By using a security measure called access point
By using a security measure called access area
By using a security measure called access control
30s - Q7
What performs a repetitive task on a network?
zombie army
worm
bot
botnet
30s - Q8
How can a person be tricked into believing that an Internet Protocol address is associated with a trusted source?
By cybercrimes
By a recognition systems
By Email spoofing
By Internet Protocol spoofing
30s - Q9
How can a person protect their computer from unauthorized access?
by using a shield
by using firewalls
by using blockers
by using a backdoor
30s - Q10
What is placed on a computer without the user's knowledge that secretly collects information about a user?
rootkit
trojan horse
spyware
adware
30s