placeholder image to represent content

SysAd - Quiz 07

Quiz by Stephanie Rose Basilio

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
15 questions
Show answers
  • Q1
    This anything that can harm a computer
    Vulnerability
    Degrees of harm
    Countermeasures
    Threats
    45s
  • Q2
    This is the levwl of potential damage
    Countermeasures
    Vulnerability
    Threats
    Degrees of harm
    45s
  • Q3
    These are steps taken to block a threat
    Threats
    Countermeasures
    Degrees of harm
    Vulnerability
    45s
  • Q4
    In the discussion, I gave a situation where a person had their simcard replaced by someone using a fake ID then gaining access to their online accounts, which threat to user does this sample belong to?
    Loss of privacy
    Web bugs
    Identify theft
    Spyware
    45s
  • Q5
    As discussed, which of the ff actions are regarded as safe when paying using your debit/ credit cards?
    Sharing the CVV to the cashier so the transaction will go through
    Make sure you have a sticker convering the CVV before paying
    Hand-in your cards to the cashier while paying
    Insist on being the one to tap or insert the card in paying
    45s
  • Q6
    Which threat to users pertain to small programs embedded in gif images?
    Loss of privacy
    Web bugs
    Spyware
    Identify theft
    45s
  • Q7
    <ABC>Which of the ff are threats to hardware?
    Natural Disasters
    Theft and vandalism
    Human threats
    Power-related threats
    45s
  • Q8
    This is considered as the most serious threat
    Threats to User
    Threats to Data
    Threats to Hardware
    45s
  • Q9
    In the discussion, what was the way that the "i love you' virus was spread?
    through emails
    through pop-ups
    through spyware
    through bugs
    45s
  • Q10
    In the discussion, these pose like a software that you willingly download and install, but are threats to data.
    Internet Fraud
    Virus
    Trojan horse
    Cybercrime
    45s
  • Q11
    This is a threat to data wherein attackers, try to launch so many requests to a public server so legit users will have a difficulty accessing it.
    DDOS
    Internet Fraud
    Trojan horse
    Cybercrime
    45s
  • Q12
    This threat to data is nationwide
    Internet Fraud
    Cyber terrorism
    DDOS
    Cybercrime
    45s
  • Q13

    This term belongs to thieves trying to get your information through links sent to you via SMS, email, QR codes, etc.

    Users re-arrange answers into correct order
    Jumble
    45s
  • Q14

    What three-lettered acronym pertains to a code you receive through SMS or email that helps you safely log in / do online transactions?

    Users enter free text
    Type an Answer
    45s
  • Q15

    What three-lettered acronym pertains to security code on the back of your credit/ debit cards?

    Users enter free text
    Type an Answer
    30s

Teachers give this quiz to your class