PRIMARY 5 SECOND TERM SECURITY EDUCATION REVISION
Subject : Security Education
Class : Primary 5
Term : Second Term
Week : Week 11
Topic :
SECURITY EDUCATION SECOND TERM REVISION TEST
ANSWER THE FOLLOWING QUESTIONS :
- Which of the following refers to the protection of electronic information from unauthorized activities? A. Information Security B. Information Technology C. Information Password
- The protection of sensitive information from unauthorized actions such as recording, modification, inspection, damage, or loss of use is referred to as __________. A. Authorized Activities B. Unauthorized Dealer C. Unauthorized Activities
- Information security ensures the __________ of personal or organizational data, such as customer account details, financial data, or intellectual property. A. Safety B. Privacy C. Both A and B
- A __________ is a code used with 4 or 6 digits that serves as a personal identification number. A. Personal Information Number B. Personal Introduction Number C. Personal Identification Number
- A __________ is a type of recognition that confirms an individual’s identity using their thumb. A. Fingerprint B. Facebook C. Face Scanner
- A __________ is a type of recognition that confirms an individual’s identity using their face. A. Fingerprint B. Facebook C. Face Scanner
- A __________ is a type of recognition that confirms an individual’s identity using their eye. A. Finger Scanner B. Eye Scanner C. Eye Print Scanner
- __________ refers to an additional code or pin used immediately after a password or passcode. A. 2FA B. 2face C. 2 Factor
- Authentication is also known as __________. A. 2FA B. 2face C. 2 Factor
- Define information security.
- ______ refers to being protected from harm or danger in any location, such as at home, school, or elsewhere. A. Security B. Insecurity C. Safety
- When you are at home and the doors or gate are locked, you feel safe and relaxed. A. True B. False C. Both
- ______ occurs when you don’t feel protected or safe from harm. A. Security B. Insecurity C. Safety
- ______ refers to taking extra measures to ensure one’s personal safety at all times. A. Personal insecurity B. Stranger C. Personal Security
- The following is not a security agent: A. Parent C. Vigilant C. Stranger
- The following is an agent of personal security: A. Parent B. Stranger C. A and B
- Irresponsible parenting can lead to a child’s personal insecurity. A. True B. False C. A and B
- The following is not a role of parents in a child’s personal security: A. Talking to strangers B. Talking to parents C. Talking to police
- What is the main purpose of cultivating a culture of empowerment and improvement in information security? A. To improve accountability B. To increase employee engagement C. To improve knowledge and skills
- What is the primary function of information security in terms of improving accountability? A. To provide appropriate training and resources B. To preserve data integrity C. To make data available to authorized users
- What is the role of information security in maintaining consistent security standards and processes? A. To identify and prioritize risks B. To improve security capacity and capability C. To ensure all employees follow the same guidelines and procedures
- What is the primary objective of information security in protecting information assets and processes? A. To minimize the risk of data breaches B. To promote good governance and engagement C. To encourage best practices
- What is the primary function of information security in identifying and managing risks? A. To implement appropriate controls B. To improve knowledge and skills C. To increase employee engagement
- What is the role of information security in enhancing security capacity and capability? A. To provide appropriate training and resources B. To build capacity and capability through continuous learning and development C. To make data available to authorized users
- What is the primary purpose of promoting good governance and engagement in information security? A. To build trust and transparency B. To minimize the risk of data breaches C. To encourage best practices
- What is the main function of information security in preserving data integrity? A. To ensure data is accurate, complete, and secure B. To improve knowledge and skills C. To provide appropriate training and resources
- What is the role of information security in making data available to authorized users? A. To protect data from unauthorized access and misuse B. To promote good governance and engagement C. To encourage best practices
- What is the main objective of information security in encouraging best practices? A. To ensure organizations remain at the forefront of the industry B. To improve knowledge and skills C. To provide appropriate training and resources