Key behavior # 2 Be Secure Awareness Quiz

Slides:



Advertisements
Similar presentations
Louisiana GEE Social Studies Assessment Practice No Answers Version Note: Information items in this PowerPoint were taken from the State GEE Assessment.
Advertisements

Using the What Am I Template Copy the presentation to your hard drive. Open the slides using slide sorter and copy slides #3, 4 and 5 for each question.
What is a CAT?. Introduction COMPUTER ADAPTIVE TEST + performance task.
Using the Jumble Word Template
Test Your Knowledge By Catherine Phipps. x + 3 =6 a.5 b.4 c.3 d.2.
How to Login into SSA ?. Home Page Click on My Profile.
VAVLPVCTYMAUS PSABLADDERZSB EBSANTESHTICL RLDUDSKTTVSRA EDEARCENEAUOD CRFNORSASINTD TPEUUOCPTDATP UNRTMTRBEEXME MIEUSUULSNSNN USNMEMNISAIIT AESXSVPENNISI.
Counting Currency For Special Education K-12 Next Slide.
Practice Quiz: Instructions You must view this in presentation mode. To do this, click on this icon at the bottom of the page:
To navigate through this slideshow, use the arrow keys on your keyboard to go forward or backward.  or  Use your mouse to click to the next step within.
QPLNHTURBIOTS CADAIASOINCOS OSTPOSTLGVAGT AJRLFKLEROUEA CLARITYSOLSTB HTEAMVSRUVAHI INTERACTPELEL NAPKSOCIALIRI GSOCIOGRAMTST CONFORMITYYTY 14 WORDS ANSWERS.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Introduction Page On this page you will introduce yourself and why you are presenting this PowerPoint (type over existing textbox information for each.
Test Your Knowledge. x + 3 =6 a.5 b.4 c.3 d.2 y - 11= 78 a. 69 b. 89 c. 87 d. 68.
Unit 8.1 Creating an E-safety quiz using VB on Powerpoint Welcome to my E-Safety quiz.
E-safety Quiz. What is E-safety? E-safety is keeping safe online. It is very important to know how to do this now as there is more and more social networking.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Slide 2 Refer students to the slide. Call their attention to the question on the slide. Elicit if it is to answer about appearance or personality.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Instruction For the Chinese vocabulary: Record your pronunciation of the character or word. Provide the English meaning. Use the mouse write the character.
Heredity Quiz By Megan McCarthy Instructions Read each question carefully and choose the best possible answer. If correct, move on to the next question.
Start Quiz. Instructions: 1.There is only 1 possible answer on every question. 2.When you are completing the Quiz make sure you are in a quiet environment.
Character Education. Character Pattern of behavior, thoughts, and feelings based on universal principles of moral strength and integrity.
IMD 315 Designing Interactive Interfaces Assignment #2 Oral Presentation by Allin Harmon USER INTERFACE DESIGN PATTERNS.
Quiz Show Main Board Multiplication by : 7’s Multiplication by : 12’s Multiplication by : 8’s Multiplication by: 9’s Multiplication.
1 Once you log in – How to create your profile Company Name TID Contact Name - Enter your name using the format First Name space Last Name User ID – will.
On the screens click on the number you think is the right answer. Three times tables Good luck!
Money Quiz!!!!. Write the question number and the answer in your maths book. How much money is shown? 1.
Timed Quiz You are about to see 6 questions. You need to work out which answer is the odd one out. You have 30 seconds per question Click to continue.
Good Luck !! Type your Instructions for your quiz.
Quiz Title Your name goes here. Question 1 Click here for answer Click here for answer Go to question 2 Go to question 2.
Using the Correct Order Template Copy the presentation to your hard drive. Open the slides using slide sorter and copy slides #3, 4, and 5 for each question.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
There will be eight questions, for each one click what you think is the right answer. If you get it wrong you will have to click the back button at the.
whoop 1.2
Pen Tool McGraw-Hill Ryerson Pre-Calculus 11 Chapter 1 Sequences and Series Section 1.5 Click here to begin the lesson.
TAKS Exit Review Math by Morrison 2012 © Math by Morrison
Why is this called “the ostrich effect”?
Instructions for Creating a WWII Jeopardy Game
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Career Guidance Washington Lesson 9-6
Internet safety quiz Year 7.
TAKS Exit Review Math by Morrison 2012 © Math by Morrison
Video and Quiz Links for Skin, Hair, and Nails
Key behavior # 1 Be Secure Awareness Quiz
w!se Test Preparation User ID: Lchs757
Introduction to Digital Technology Exam
Call To  First of all, sign into “My Apple id page” of Apple and hit on “Manage My Apple ID”.  To proceed further, type your Apple.
Welcome to WebAssign! 1st Day of Class.
Welcome to WebAssign! 1st Day of Class.
Quiz About [Your topic]
Welcome to WebAssign! 1st Day of Class.
If you delete this after reading... you'll spend a year of ill luck!
Unit 4: Lesson 6: Encryption With Keys and Passwords
A Question of Maths Instructions: Choose a number to answer a question
Student Experience It’s your education.
Algorithms.
Welcome to WebAssign! 1st Day of Class.
Quiz Name Here Click to start.
Press the F5 key on your keyboard to start the quiz.
Cultural Ecology By Frank Elwell.
GET THE TEMPLATE AND INSTRUCTIONS
Warm-Up Geothermal energy is not a true renewable resource. Why?
= x 2 = = 20 4 x 5 = = 16 4 x 4 = = 18 6 x 3 = = 12 2 x 6 = 12.
Refresh: Click Here.
Safe, secure and empowered
Law Abiding Behavior Class 1.
OSA Certificate of Online Safety
OSA Certificate of Online Safety
Presentation transcript:

Key behavior # 2 Be Secure Awareness Quiz Information Protection & Cyber Security Internal

Instructions Key behavior # 2: Use strong Passwords Can you identify a strong password from a weak one? In this quiz, you will have the chance to test your knowledge. Start by activating the presentation mode in PowerPoint On the next slide, you will find a list of passwords First, identify which passwords are „weak“ or „strong“ (Hint: Consider the typical characteristics of a strong password) With the next set of clicks, the answers for each item in the list will be revealed For each correct answer, give yourself two points. Sum up your points and compare your result to the Be Secure awareness levels shown on the Be Secure - Refresher Page Good luck! Internal

Are these passwords „weak“ or „strong“? Not complex (only numbers) Easy to decipher 123454321 Strong At least 8 characters long Sufficiently complex Difficult to decipher ? XD49#88a5mime Weak Less than 8 characters long ? rUp8$ This one was created by using a password algorithm: mWDco8h2d!= My work day consists of 8 hours today! Weak Not complex (simple word) Easy to decipher ? doowylloH Strong At least 8 characters long Sufficiently complex Difficult to decipher ? mWDco8h2d! Internal