PRIMARY 5 SECOND TERM SECURITY EDUCATION REVISION

Subject : Security Education 

Class : Primary 5

Term : Second Term

Week : Week 11

Topic :

SECURITY EDUCATION SECOND TERM REVISION TEST 

ANSWER THE FOLLOWING QUESTIONS  :

  1. Which of the following refers to the protection of electronic information from unauthorized activities? A. Information Security B. Information Technology C. Information Password
  2. The protection of sensitive information from unauthorized actions such as recording, modification, inspection, damage, or loss of use is referred to as __________. A. Authorized Activities B. Unauthorized Dealer C. Unauthorized Activities
  3. Information security ensures the __________ of personal or organizational data, such as customer account details, financial data, or intellectual property. A. Safety B. Privacy C. Both A and B
  4. A __________ is a code used with 4 or 6 digits that serves as a personal identification number. A. Personal Information Number B. Personal Introduction Number C. Personal Identification Number
  5. A __________ is a type of recognition that confirms an individual’s identity using their thumb. A. Fingerprint B. Facebook C. Face Scanner
  6. A __________ is a type of recognition that confirms an individual’s identity using their face. A. Fingerprint B. Facebook C. Face Scanner
  7. A __________ is a type of recognition that confirms an individual’s identity using their eye. A. Finger Scanner B. Eye Scanner C. Eye Print Scanner
  8. __________ refers to an additional code or pin used immediately after a password or passcode. A. 2FA B. 2face C. 2 Factor
  9. Authentication is also known as __________. A. 2FA B. 2face C. 2 Factor
  10. Define information security.
  11. ______ refers to being protected from harm or danger in any location, such as at home, school, or elsewhere. A. Security B. Insecurity C. Safety
  12. When you are at home and the doors or gate are locked, you feel safe and relaxed. A. True B. False C. Both
  13. ______ occurs when you don’t feel protected or safe from harm. A. Security B. Insecurity C. Safety
  14. ______ refers to taking extra measures to ensure one’s personal safety at all times. A. Personal insecurity B. Stranger C. Personal Security
  15. The following is not a security agent: A. Parent C. Vigilant C. Stranger
  16. The following is an agent of personal security: A. Parent B. Stranger C. A and B
  17. Irresponsible parenting can lead to a child’s personal insecurity. A. True B. False C. A and B
  18. The following is not a role of parents in a child’s personal security: A. Talking to strangers B. Talking to parents C. Talking to police
  19. What is the main purpose of cultivating a culture of empowerment and improvement in information security? A. To improve accountability B. To increase employee engagement C. To improve knowledge and skills
  20. What is the primary function of information security in terms of improving accountability? A. To provide appropriate training and resources B. To preserve data integrity C. To make data available to authorized users
  21. What is the role of information security in maintaining consistent security standards and processes? A. To identify and prioritize risks B. To improve security capacity and capability C. To ensure all employees follow the same guidelines and procedures
  22. What is the primary objective of information security in protecting information assets and processes? A. To minimize the risk of data breaches B. To promote good governance and engagement C. To encourage best practices
  23. What is the primary function of information security in identifying and managing risks? A. To implement appropriate controls B. To improve knowledge and skills C. To increase employee engagement
  24. What is the role of information security in enhancing security capacity and capability? A. To provide appropriate training and resources B. To build capacity and capability through continuous learning and development C. To make data available to authorized users
  25. What is the primary purpose of promoting good governance and engagement in information security? A. To build trust and transparency B. To minimize the risk of data breaches C. To encourage best practices
  26. What is the main function of information security in preserving data integrity? A. To ensure data is accurate, complete, and secure B. To improve knowledge and skills C. To provide appropriate training and resources
  27. What is the role of information security in making data available to authorized users? A. To protect data from unauthorized access and misuse B. To promote good governance and engagement C. To encourage best practices
  28. What is the main objective of information security in encouraging best practices? A. To ensure organizations remain at the forefront of the industry B. To improve knowledge and skills C. To provide appropriate training and resources
Spread the word if you find this helpful! Click on any social media icon to share