Quiz about cybersecurity

Quiz about cybersecurity

University

7 Qs

quiz-placeholder

Similar activities

Mobile Phone Virus Quiz

Mobile Phone Virus Quiz

University

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Types of Computer Viruses

Types of Computer Viruses

University

10 Qs

Tes Keamanan Jaringan

Tes Keamanan Jaringan

10th Grade - University

10 Qs

Cyber Security

Cyber Security

University

8 Qs

Computer Booting and Operating Systems Quiz

Computer Booting and Operating Systems Quiz

University

12 Qs

Dynamic Malware Analysis

Dynamic Malware Analysis

University

10 Qs

Lesson 20 - Malware

Lesson 20 - Malware

University

8 Qs

Quiz about cybersecurity

Quiz about cybersecurity

Assessment

Quiz

Computers

University

Easy

Created by

Jakub Filipek

Used 3+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an example of a cyber threat?

A natural disaster

A fire

A virus

A power outage

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a firewall?

To protect against physical intruders

To protect against malware

To encrypt data

To speed up internet connection

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a secure way to store passwords?

Writing them down on a piece of paper

Saving them in a plain text file on your computer

Using a password manager

Using the same password for multiple accounts

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main purpose of two-factor authentication?

To make it harder for hackers to guess your password

To prevent malware attacks

To encrypt data

To speed up internet connection

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is phishing?

A type of malware that infects your computer

A social engineering technique used to steal sensitive information

A denial-of-service attack that targets a specific website

A method of encrypting data to protect it from hackers

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What are some potential consequences of a data breach?

Financial loss and damage to reputation

Physical damage to equipment

Legal action against the victim

None of the above

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What are some best practices for protecting your personal devices from cyber threats?

Keep software up-to-date and use antivirus software

Use strong, unique passwords and two-factor authentication

Be cautious of suspicious emails and links

All of the above