Page 63 - Cyber Safety C-8
P. 63
test sheet - 1
Based on Chapters 1 to 3
A. Tick ( ) the correct option.
1. The continuous trail of data created by online activities is called a .
(i) malware trail (ii) digital footprint
(iii) cyber attack (iv) private record
2. Which principle of the CIA Triad ensures information is accessed only by authorised
individuals?
(i) Availability (ii) Identity
(iii) Confidentiality (iv) Control
3. Which digital right protects personal data like name, photos, and passwords?
(i) Right to learn and use technology (ii) Right to privacy
(iii) Right to safety and protection (iv) Right to information
4. Which of the following is a key digital responsibility?
(i) Think before posting (ii) Share passwords freely
(iii) Spread rumours online (iv) Tease others online
5. Which option explains about ransomware attacks?
(i) clean viruses (ii) encrypt data and demand payment
(iii) create new passwords (iv) block social media accounts only
6. Cyber protection includes tools, practices, and used to secure computers,
networks, and information from attacks.
(i) careless actions (ii) responsible behaviours
(iii) entertainment activities (iv) online games
7. Which cyber threat encrypts files and demands payment to unlock them?
(i) Social engineering (ii) Identity theft
(iii) Phishing (iv) Ransomware
Sheet
- 1
Periodic Assessment - 1 61 61
Test

