Cyber Security Quiz

Quiz
•
Instructional Technology, Computers
•
University
•
Medium

Noor Haidah
Used 25+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This type of attack is designed to hinder the normal operation of a website, or other network resource.
DoS attack
Phishing
Browser hijacker
Zero-Day Attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes spam?
Collect information about a person or organisation without their knowledge
Performing an unauthorised, usually malicious, action such as erasing files
Putting unnecessary load on the network by making copies of files
Sending unwanted bulk messages.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following can protect a computer from the risk of unwanted emails?
Anti-spam software.
Anti-virus software.
Anti-spyware software.
PC diagnostic software.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following could lead to the spread of a malicious program?
Using only software that has been checked for viruses.
Maintaining regularly updated anti-virus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes why firewalls are used?
To prevent unauthorised access by incoming transmissions.
To prevent destruction of a computer in the event of a fire.
To enable easy downloading of data from web sites.
To detect and disable viruses already on a computer.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following shows respect for the confidentiality of information?
Discussing confidential information over the telephone.
Disclosing confidential information only to authorised individuals.
Uploading confidential information to a shared web site.
Emailing confidential information to a colleague.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is an example of phishing?
An email warning the recipient of a computer virus threat
An email directing the recipient to forward the email to friends
An email directing the receiver to enter personal details on a fake website
An email directing the recipient to download an attachment
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Cyber Security

Quiz
•
University
12 questions
Lesson 1 - Introduction to Operating Systems

Quiz
•
University
12 questions
Data Breach Quiz

Quiz
•
University
13 questions
Tech Tarik 2.0 : Phishing Awareness Quiz by CYBERHAX

Quiz
•
University
10 questions
Email Etiquette

Quiz
•
University
15 questions
System & Application Software

Quiz
•
University
10 questions
Cybersecurity Threats Quiz

Quiz
•
University
15 questions
Security Awareness Quiz

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade