class management

GES Aptitude Test 2025, Trial Quiz on Cybersecurity.

Here are sample multiple-choice questions for your revision and preparation for the GES 2025 promotion exams.

GES Aptitude Test 2025, Trial Quiz on Cybersecurity.

Sample Multiple Choice Questions for Preparation.

1 / 35

1. The main law governing the protection of personal data in Ghana is:

2 / 35

2. A teacher protecting their laptop with a password demonstrates:

3 / 35

3. A teacher who posts students' grades on social media violates:

4 / 35

4. Which of these is the BEST first step when a student reports cyberbullying?

5 / 35

5. A fake email requesting your GES login details is an example of:

6 / 35

6. Why should teachers monitor learners' online activity in school platforms?

7 / 35

7. Which of these is NOT a good way to prevent malware infections?

8 / 35

8. A teacher receives an email asking for login details with a suspicious link. What should they do FIRST?

9 / 35

9. When a hacker locks files and demands money before unlocking them, it is called:

10 / 35

10. One important cybersecurity practice for teachers is to:

11 / 35

11. Which of the following is the best practice for password security?

12 / 35

12. Malware refers to:

13 / 35

13. The Act that established the Cyber Security Authority in Ghana is:

14 / 35

14. Which of the following is NOT part of the cybersecurity fundamentals (CIA triad)?

15 / 35

15. Backing up teaching materials regularly helps protect against:

16 / 35

16. What is the primary purpose of confidentiality in cybersecurity?

17 / 35

17. Why is digital citizenship important in schools?

18 / 35

18. The ethical use of technology and respect for others online is known as:

19 / 35

19. The main goal of cybersecurity is to:

20 / 35

20. Which is an example of promoting digital citizenship among learners?

21 / 35

21. Which of the following is a social engineering attack?

22 / 35

22. The main purpose of cybersecurity is to:

23 / 35

23. Which Act provides for legal online transactions in Ghana?

24 / 35

24. Which of these is a type of cyberbullying?

25 / 35

25. What is cybersecurity primarily concerned with?

26 / 35

26. Which of the following is an example of learner data that must be protected?

27 / 35

27. A fake account is created impersonating a teacher. What is the most appropriate action?

28 / 35

28. The act of using ICT fairly, responsibly, and safely is called:

29 / 35

29. A teacher's use of weak passwords such as "12345" can lead to:

30 / 35

30. Which of the following is NOT a good cybersecurity practice?

31 / 35

31. Accessing the school's online platform using public Wi-Fi exposes the teacher to:

32 / 35

32. Which of the following is an effective way to respond to online harassment of teachers?

33 / 35

33. Which of the following best explains the relationship between cybersecurity and fraud?

34 / 35

34. Which of these is a good example of data protection in schools?

35 / 35

35. Which element of digital citizenship involves buying and selling online safely?

Your score is

The average score is 0%

0%


Follow to join WhatsApp Channel

Telegram Channel

Leave a Reply

Your email address will not be published. Required fields are marked *