Quiz Summary
0 of 6 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 6 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 6
1. Question
Match the data security threat with its description.
Sort elements
- Accidental data exposure
- Malware
- Insider threats
- Ransomware
- Cloud data storage
-
This threat involves employees accidentally or negligently exposing sensitive information.
-
Malicious software that infects computers and networks through vulnerabilities.
-
Individuals within the organisation intentionally or inadvertently putting data at risk.
-
A type of malware that encrypts data and demands a ransom for its release.
-
The challenge of controlling and protecting data stored in the cloud.
CorrectIncorrect -
Question 2 of 6
2. Question
Which of the following is a common data security threat?
CorrectIncorrect -
Question 3 of 6
3. Question
Fill in the blanks by dragging the words in the correct place.
Sort elements
- Privacy
- CCPA (California Consumer Privacy Act)
- OECD Privacy
-
The _________ is a fundamental human right, and data protection laws exist to guard that right.
-
The _________ requires that consumers be made aware of what personal data is collected and gives consumers control over their personal data.
-
The _________ Guidelines were the first internationally-agreed privacy principles and were updated in 2013.
CorrectIncorrect -
Question 4 of 6
4. Question
Match the privacy protection practices with their descriptions.
Sort elements
- Use strong and unique passwords.
- Block search engines from tracking you.
- Review privacy settings on online accounts.
- Purge unused mobile apps and browser extensions.
-
Protects against identity theft and hackers.
-
Helps improve search engine privacy.
-
Ensures that you share only necessary information.
-
Removes potential security vulnerabilities.
CorrectIncorrect -
Question 5 of 6
5. Question
Fill in the blanks by dragging the words in the correct place.
Sort elements
- Social citizenship
- Digital technology
- Well-being
- Regulatory frameworks
-
__________ is the concept of citizenship that extends beyond formal legal rights and obligations.
-
__________ refers to the application of digital systems, tools, and platforms that facilitate the creation, storage, processing, and transmission of information.
-
Digital technology provides individuals with increased access to information, resources, and services, promoting __________.
-
The dominance of tech companies and the concentration of power in the hands of a few can raise concerns about the control and influence they wield over digital platforms, calling for __________.
CorrectIncorrect -
Question 6 of 6
6. Question
Match the following terms to their corresponding descriptions.
Sort elements
- Digital divide
- Digital responsibilities
- Digital rights
- Digital empowerment
- Digital inclusion and equity
-
Bridging the gap between those with access to digital technology and those without, promoting equal opportunities for participation.
-
Acknowledging the importance of responsible digital behavior, ethical use of technology, and active participation in shaping digital policies.
-
Ensuring individuals have access to the internet, digital privacy, data protection, and the right to digital literacy and skills training.
-
Recognizing the potential of digital technology to empower individuals and communities to pursue educational, professional, and personal goals.
-
Promoting equitable access to digital resources, services, and opportunities, regardless of socioeconomic status or background.
CorrectIncorrect