Page 48 - Cyber Safety C-6
P. 48
4. Which of the following is an example of a strong password rule?
(i) Birth date (ii) Passphrase
(iii) Pet name (iv) Notes
5. Spot the method that adds more layers of security than Two-Factor Authentication (2FA).
(i) One-Factor Authentication (ii) Password
(iii) Fingerprint (iv) Multi-Factor Authentication
B. Write ‘T’ for true and ‘F’ for false.
1. A firewall blocks harmful data from entering your device.
2. Biometric security features like Face ID and Fingerprint Unlock are weak security measures.
3. Hackers can steal your hard-earned points, virtual currency or rare items.
4. Multi-Factor Authentication only requires a password or PIN to access your account.
5. Simple passwords like "12345" or "password" are difficult for hackers to guess.
C. Fill in the blanks using the given hints:
1. Digital security is about using the right and practices to keep Hints
your data safe while you use the Internet. Password
2. A hacker could guess your if it is linked to your birthdate or Strong
pet’s name. Firewall
3. A password is a key that helps protect your accounts and Tools
personal information . Accounts
4. Avoid using the same password for all your .
5. A acts as a barrier between your device and the Internet.
D. Answer the following questions:
1. What is digital security?
2. Explain the term authentication.
3. List the 5 golden rules for a strong password.
46 Computer Science - VI

