Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

quiz-placeholder

Similar activities

EMERGINGX

EMERGINGX

University

15 Qs

Epistemología y Educación

Epistemología y Educación

University

10 Qs

INFORMATICA II

INFORMATICA II

University

10 Qs

Business Tools

Business Tools

University

10 Qs

Hardware

Hardware

10th Grade - University

10 Qs

Teknologi dan Kewirausahaan

Teknologi dan Kewirausahaan

University

14 Qs

Jaringan Dasar

Jaringan Dasar

University

10 Qs

Introducción a la Inteligencia de Negocios

Introducción a la Inteligencia de Negocios

University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Soraya Meividya

Used 51+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is responsible for cyber security in a company? Choose the best answer.

Business owners. They run the business, so they need to know cyber security basics and put them in practice to reduce the risk of cyber-attacks.

Managers, because they are responsible for making sure that staff members are following the right practices.

All staff members should know some cyber security basics to reduce the risk of cyber-attacks.

IT specialists, because they are in the best position to know about and promote cyber security within a business.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these groups are commonly exploit the vulnerabilities of the system?

Criminals

Governments

Hacktivists

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cyber security, what does CIA stand for?

Confidentiality, Integrity, Accessibility

Cyber security, Internet, Availability

Confidentiality, Integrity, Availability

Capability, Integrity, Accessibility

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does data integrity refer to?

The level of assurance which can be given as to how structured data is.

The level of assurance which can be given as to how accurate and trustworthy data is.

The level of assurance which can be given as to how strong data is.

The level of assurance which can be given as to how relevant the data is.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does confidentiality of data refer to?

Rules which gave access based on the rights of the user

Rules which restrict access only to those who need to know basis

Rules which only give least privilege to the data

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

Software that infects computer networks and mobile devices to hold your data until you send the attackers money.

Software used to protect your computer or mobile device from harmful viruses.

Computer equipment that criminals steal from you and won’t return until you pay them.

A form of crypto currency.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should You do when a vendor text you a link to reset your login credentials?

Reply to the text to confirm that you really need to renew your password.

Click on the link. If it takes you to the vendor’s website, then you’ll know it’s not a scam.

Pick up the phone and call the vendor, using a phone number you know to be correct, to confirm that the request is real.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?