Intro to Cybersecurity

Intro to Cybersecurity

Professional Development

10 Qs

quiz-placeholder

Similar activities

Week 2

Week 2

Professional Development

11 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Post Assessment - Cybersecurity Awareness

Post Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

Cibersegurança

Cibersegurança

Professional Development

12 Qs

cyberops14

cyberops14

Professional Development

10 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Domain 1 Quizizz Game (Social Engineering Techniques)

Domain 1 Quizizz Game (Social Engineering Techniques)

Professional Development

11 Qs

Intro to Cybersecurity

Intro to Cybersecurity

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Jeanelle Mauricio

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a malicious executable code that is attached to other executable files, often legitimate programs.

Spyware

Ransomware

Virus

Adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a method of infiltration used by malicious party to send a fraudulent email disguised as being from a legitimate or trusted source

Social Engineering

Brute-force attacks

Phishing

Spear Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is the protection of network system and data from unauthorized use or harm.

Information Security

Cybersecurity

Internet of Things

CISCO

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CIA means

Capable,

Internet,

Advance

Computer, Information, Accurate

Confidentiality, Integrity, Availability

Cost,

Integer,

Area

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a person who breaks into computers or networks to gain access.

Trespasser

Kidnapper

Cashier

Hacker

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

also called privacy, which means that data access is restricted to authorized personnel only.

Integrity

Confidentiality

Availability

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a malicious code that replicates itself by independently exploiting vulnerabilities in networks.

Trojan Horse

MITM

Scareware

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?