Cyber security

Cyber security

University

10 Qs

quiz-placeholder

Similar activities

Warm up quiz

Warm up quiz

University

10 Qs

IPhones

IPhones

4th Grade - Professional Development

10 Qs

Riddle Quiz

Riddle Quiz

KG - Professional Development

15 Qs

Wechselpräpositionen

Wechselpräpositionen

University

15 Qs

Round 3: Hard

Round 3: Hard

9th Grade - University

15 Qs

Assembly Quiz

Assembly Quiz

KG - Professional Development

10 Qs

fortnite

fortnite

University

8 Qs

Random stuff

Random stuff

KG - Professional Development

12 Qs

Cyber security

Cyber security

Assessment

Quiz

Fun

University

Hard

Created by

Romelyn Menguin

Used 379+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Anti-virus

Firewall

Encryption

Malware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An individual who uses scripts or software written by someone else to exploit or break into a computer system.

Cracker

Ethical Hacker

Script Kiddie

Man in the middle

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following passwords meet password requirements?

p455w0rd1

!@#$%^&*

akHGksmLN

uP1b@!Si7p

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?

Turn your computer off

Disconnect your computer from the network

Unplug your mouse

Run anti-virus

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Cyber criminal

Phishing

Attack password

Online predator

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access

Cyber Security

White Hat Hacker

Domain Name Server

All of the above

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What are the motives behind cyber crime?

Demanding ransom

Propagating religious or political beliefs

Financial loss to the target

Information thefts and manipulating data

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?