Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

quiz-placeholder

Similar activities

Sunset Bank's Information Security Awareness Test

Sunset Bank's Information Security Awareness Test

1st Grade - Professional Development

8 Qs

ICT-BEd_4th Semester

ICT-BEd_4th Semester

10th Grade - University

15 Qs

CSF Week 2

CSF Week 2

University

10 Qs

iGCSE ICT: Chapter 1

iGCSE ICT: Chapter 1

KG - University

12 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Cyber Security

Cyber Security

University

10 Qs

Security Awareness Quiz

Security Awareness Quiz

University

15 Qs

Lesson 1 - Introduction to Operating Systems

Lesson 1 - Introduction to Operating Systems

University

12 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Instructional Technology, Computers

University

Medium

Created by

Noor Haidah

Used 12+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of attack is designed to hinder the normal operation of a website, or other network resource.

DoS attack

Phishing

Browser hijacker

Zero-Day Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes spam?

Collect information about a person or organisation without their knowledge

Performing an unauthorised, usually malicious, action such as erasing files

Putting unnecessary load on the network by making copies of files

Sending unwanted bulk messages.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following can protect a computer from the risk of unwanted emails?

Anti-spam software.

Anti-virus software.

Anti-spyware software.

PC diagnostic software.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following could lead to the spread of a malicious program?

Using only software that has been checked for viruses.

Maintaining regularly updated anti-virus software.

Opening only virus-checked file attachments from known sources.

Using a USB Flash Drive from an unknown source to exchange data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes why firewalls are used?

To prevent unauthorised access by incoming transmissions.

To prevent destruction of a computer in the event of a fire.

To enable easy downloading of data from web sites.

To detect and disable viruses already on a computer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following shows respect for the confidentiality of information?

Discussing confidential information over the telephone.

Disclosing confidential information only to authorised individuals.

Uploading confidential information to a shared web site.

Emailing confidential information to a colleague.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is an example of phishing?

An email warning the recipient of a computer virus threat

An email directing the recipient to forward the email to friends

An email directing the receiver to enter personal details on a fake website

An email directing the recipient to download an attachment

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?