Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

quiz-placeholder

Similar activities

Fundamentos Web

Fundamentos Web

University

15 Qs

Examen Tema 1 - Simulación

Examen Tema 1 - Simulación

University

11 Qs

Vocabulary Quiz - Computer - 01

Vocabulary Quiz - Computer - 01

12th Grade - University

10 Qs

Arquitetura de Software - Arquitetura Cliente-Servidor

Arquitetura de Software - Arquitetura Cliente-Servidor

University

15 Qs

Google Calendar

Google Calendar

University

10 Qs

Papel del profesorado con las TIC

Papel del profesorado con las TIC

KG - Professional Development

10 Qs

INSTRUMENTACIÓN PRIMARIA

INSTRUMENTACIÓN PRIMARIA

University

12 Qs

PM Time Management

PM Time Management

University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Instructional Technology, Computers

University

Medium

Created by

Noor Haidah

Used 26+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of attack is designed to hinder the normal operation of a website, or other network resource.

DoS attack

Phishing

Browser hijacker

Zero-Day Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes spam?

Collect information about a person or organisation without their knowledge

Performing an unauthorised, usually malicious, action such as erasing files

Putting unnecessary load on the network by making copies of files

Sending unwanted bulk messages.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following can protect a computer from the risk of unwanted emails?

Anti-spam software.

Anti-virus software.

Anti-spyware software.

PC diagnostic software.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following could lead to the spread of a malicious program?

Using only software that has been checked for viruses.

Maintaining regularly updated anti-virus software.

Opening only virus-checked file attachments from known sources.

Using a USB Flash Drive from an unknown source to exchange data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes why firewalls are used?

To prevent unauthorised access by incoming transmissions.

To prevent destruction of a computer in the event of a fire.

To enable easy downloading of data from web sites.

To detect and disable viruses already on a computer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following shows respect for the confidentiality of information?

Discussing confidential information over the telephone.

Disclosing confidential information only to authorised individuals.

Uploading confidential information to a shared web site.

Emailing confidential information to a colleague.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is an example of phishing?

An email warning the recipient of a computer virus threat

An email directing the recipient to forward the email to friends

An email directing the receiver to enter personal details on a fake website

An email directing the recipient to download an attachment

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?