Cyber security

Cyber security

University

10 Qs

quiz-placeholder

Similar activities

Pet simulator x Test

Pet simulator x Test

1st Grade - Professional Development

13 Qs

Indi(Go)es to Treg 7

Indi(Go)es to Treg 7

University - Professional Development

11 Qs

Roblox

Roblox

KG - Professional Development

10 Qs

Nathan Hobbs - Keyboarding Quarter 1

Nathan Hobbs - Keyboarding Quarter 1

KG - Professional Development

8 Qs

GYIC Final

GYIC Final

University - Professional Development

14 Qs

Beluga Quiz (Youtube)

Beluga Quiz (Youtube)

KG - University

15 Qs

Workshop - Introduce Of a Wireshark

Workshop - Introduce Of a Wireshark

1st Grade - University

12 Qs

Roblox

Roblox

KG - Professional Development

10 Qs

Cyber security

Cyber security

Assessment

Quiz

Fun

University

Hard

Created by

Romelyn Menguin

Used 368+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Anti-virus

Firewall

Encryption

Malware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An individual who uses scripts or software written by someone else to exploit or break into a computer system.

Cracker

Ethical Hacker

Script Kiddie

Man in the middle

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following passwords meet password requirements?

p455w0rd1

!@#$%^&*

akHGksmLN

uP1b@!Si7p

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?

Turn your computer off

Disconnect your computer from the network

Unplug your mouse

Run anti-virus

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Cyber criminal

Phishing

Attack password

Online predator

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access

Cyber Security

White Hat Hacker

Domain Name Server

All of the above

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What are the motives behind cyber crime?

Demanding ransom

Propagating religious or political beliefs

Financial loss to the target

Information thefts and manipulating data

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?