
Cybersecurity Quiz
Authored by Louise King
Other
9th Grade
Used 74+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
A type of cyber attack where attackers impersonate a trustworthy entity to deceive individuals into revealing sensitive information.
A type of computer virus that spreads through email attachments.
A type of online shopping scam where fake websites are created to steal credit card information.
A type of fishing technique used to catch large fish.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a social engineering attack?
Phishing
SQL Injection
Denial of Service (DoS)
Malware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common cybersecurity best practice?
Using the same password for multiple accounts.
Disabling firewalls and antivirus software.
Regularly updating software and systems to patch vulnerabilities.
Clicking on suspicious links and attachments.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
Malware is a type of software that is used for data backup and recovery.
Malware is a type of software that enhances the performance of computer systems and networks.
Malware is a type of software that helps protect computer systems and networks.
Malware is a type of software that is designed to harm or exploit computer systems and networks.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common example of a social engineering attack?
Malware
Denial of Service
SQL Injection
Phishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a cybersecurity best practice?
Using the same password for multiple accounts.
Using weak passwords
Clicking on suspicious links or attachments.
Regularly updating software and applications.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if you suspect a phishing attempt?
Report the suspicious email or website
Click on any links in the email to investigate further.
Provide personal information requested in the email.
Delete the email without opening it.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?