This type of attack is designed to hinder the normal operation of a website, or other network resource.
Cyber Security Quiz

Quiz
•
Instructional Technology, Computers
•
University
•
Medium

Noor Haidah
Used 12+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DoS attack
Phishing
Browser hijacker
Zero-Day Attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes spam?
Collect information about a person or organisation without their knowledge
Performing an unauthorised, usually malicious, action such as erasing files
Putting unnecessary load on the network by making copies of files
Sending unwanted bulk messages.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following can protect a computer from the risk of unwanted emails?
Anti-spam software.
Anti-virus software.
Anti-spyware software.
PC diagnostic software.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following could lead to the spread of a malicious program?
Using only software that has been checked for viruses.
Maintaining regularly updated anti-virus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes why firewalls are used?
To prevent unauthorised access by incoming transmissions.
To prevent destruction of a computer in the event of a fire.
To enable easy downloading of data from web sites.
To detect and disable viruses already on a computer.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following shows respect for the confidentiality of information?
Discussing confidential information over the telephone.
Disclosing confidential information only to authorised individuals.
Uploading confidential information to a shared web site.
Emailing confidential information to a colleague.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is an example of phishing?
An email warning the recipient of a computer virus threat
An email directing the recipient to forward the email to friends
An email directing the receiver to enter personal details on a fake website
An email directing the recipient to download an attachment
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
CHAPTER 1: COMPUTER SECURITY REVIEW

Quiz
•
University
13 questions
Tech Tarik 2.0 : Phishing Awareness Quiz by CYBERHAX

Quiz
•
University
12 questions
Data Breach Quiz

Quiz
•
University
10 questions
Cybersecurity Fundamentals Week 3 Quiz

Quiz
•
KG - University
10 questions
Defense in Depth Quiz

Quiz
•
University
14 questions
Cyber Threats

Quiz
•
9th Grade - University
9 questions
Social Engineering

Quiz
•
University
10 questions
Cybersecurity Threats Quiz

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade