Cyber Security Quiz

Quiz
•
Instructional Technology, Computers
•
University
•
Medium

Noor Haidah
Used 25+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This type of attack is designed to hinder the normal operation of a website, or other network resource.
DoS attack
Phishing
Browser hijacker
Zero-Day Attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes spam?
Collect information about a person or organisation without their knowledge
Performing an unauthorised, usually malicious, action such as erasing files
Putting unnecessary load on the network by making copies of files
Sending unwanted bulk messages.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following can protect a computer from the risk of unwanted emails?
Anti-spam software.
Anti-virus software.
Anti-spyware software.
PC diagnostic software.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following could lead to the spread of a malicious program?
Using only software that has been checked for viruses.
Maintaining regularly updated anti-virus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes why firewalls are used?
To prevent unauthorised access by incoming transmissions.
To prevent destruction of a computer in the event of a fire.
To enable easy downloading of data from web sites.
To detect and disable viruses already on a computer.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following shows respect for the confidentiality of information?
Discussing confidential information over the telephone.
Disclosing confidential information only to authorised individuals.
Uploading confidential information to a shared web site.
Emailing confidential information to a colleague.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is an example of phishing?
An email warning the recipient of a computer virus threat
An email directing the recipient to forward the email to friends
An email directing the receiver to enter personal details on a fake website
An email directing the recipient to download an attachment
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Security Awareness Quiz

Quiz
•
University
10 questions
Cloud Computing

Quiz
•
University
10 questions
Chapter 4: System and Application Software

Quiz
•
University
10 questions
Application Software

Quiz
•
University
10 questions
ECM3434 Business Analysis 1 - Introduction and BA techniques

Quiz
•
University
10 questions
Occupational health and safety policies and procedures

Quiz
•
University
10 questions
Chapter 1 - Introduction to Information Technology

Quiz
•
University
15 questions
Microsoft Excel

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade