Page 48 - Cyber Safety C-6
P. 48

4.  Which of the following is an example of a strong password rule?

                                  (i)  Birth date                           (ii)  Passphrase

                                 (iii)  Pet name                           (iv)  Notes

                     5.  Spot the method that adds more layers of security than Two-Factor Authentication (2FA).
                                  (i)  One-Factor Authentication            (ii)  Password


                                 (iii)  Fingerprint                        (iv)  Multi-Factor Authentication

                  B.  Write ‘T’ for true and ‘F’ for false.

                     1.  A firewall blocks harmful data from entering your device.

                     2.  Biometric security features like Face ID and Fingerprint Unlock are weak security measures.

                     3.  Hackers can steal your hard-earned points, virtual currency or rare items.

                     4.  Multi-Factor Authentication only requires a password or PIN to access your account.

                     5.  Simple passwords like "12345" or "password" are difficult for hackers to guess.


                  C.  Fill in the blanks using the given hints:

                     1.  Digital security is about using the right            and practices to keep       Hints
                         your data safe while you use the Internet.                                      Password

                     2.  A hacker could guess your                 if it is linked to your birthdate or   Strong
                         pet’s name.                                                                      Firewall

                     3.  A                 password is a key that helps protect your accounts and          Tools
                         personal information .                                                          Accounts
                     4.  Avoid using the same password for all your               .
                     5.  A                 acts as a barrier between your device and the Internet.

                  D.  Answer the following questions:

                     1.  What is digital security?






                     2.  Explain the term authentication.






                     3.  List the 5 golden rules for a strong password.










                   46   Computer Science - VI
   43   44   45   46   47   48   49   50   51   52   53