Cyber Security Camp
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
ASKI khanzaindonesia
Used 27+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is the difference between "http://" (without the "s") and "http://" (with the "s") at
the beginning of a URL?
That information entered into the site is encrypted
That the site has special high definition
That the site is not accessible to certain computers
That the site is the newest version available
2.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the following is a "phishing" attack example?
Sending a text message to someone that contains a malicious link disguised as a
notification that they have won a contest
Sending someone an email with a harmful link disguised as an email from someone
they know
Sending someone an email with a harmful link disguised as an email from someone
they know
All of the above
3.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the following options is the best for securing your router?
Disable remote management on your router
Once the router is configured, log out as the administrator.
Change the router’s default name and password
All of the above.
4.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Large corporations are the only ones targeted by cybercriminals. Is this statement true
or false?
True
False
5.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which option is the best for determining who in a company should be in charge of
cybersecurity?
They are in the best position to understand and promote cybersecurity within a
company, IT specialists are the finest candidates.
Owners of a company They are the ones that run the company, so they must be
familiar with cybersecurity fundamentals and put them into practice in order to
lower the danger of a cyberattack.
To lessen the danger of cyber assaults, all employees should have a basic
understanding of cybersecurity
Managers, because they are in charge of ensuring that employees follow the proper
procedures.
6.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
A networked group of computers used by hackers to steal information is referred to as
a...?
DDoS
Operating system
Botnet
Rootkit
7.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the four passwords listed below is the most secure?
PWh!5B
234560
Goat123
info*49
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
13 questions
Digital Technology Office 365 - 29May2020
Quiz
•
University - Professi...
11 questions
Office 365
Quiz
•
Professional Development
11 questions
Email of request
Quiz
•
12th Grade - Professi...
10 questions
Mothers Competition
Quiz
•
Professional Development
10 questions
DL Refresher
Quiz
•
KG - Professional Dev...
10 questions
FSDA OW Sec. Amsterdam
Quiz
•
Professional Development
15 questions
Code X Trade
Quiz
•
Professional Development
10 questions
Redes Digitales de Información
Quiz
•
Professional Development
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
