Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

9 Qs

quiz-placeholder

Similar activities

Automation Tech - History of Automation

Automation Tech - History of Automation

9th - 12th Grade

10 Qs

Quiz Rolling Vol.8

Quiz Rolling Vol.8

10th Grade - University

10 Qs

Cybersecurity Best Practices

Cybersecurity Best Practices

12th Grade

10 Qs

btd6

btd6

KG - Professional Development

8 Qs

Computer Coding

Computer Coding

KG - Professional Development

12 Qs

Lab Safety Analogies for the GenCyber Security Principles

Lab Safety Analogies for the GenCyber Security Principles

7th - 12th Grade

10 Qs

Risk Assessments

Risk Assessments

12th Grade - University

12 Qs

Digital forensics and Cybersecurity Quiz

Digital forensics and Cybersecurity Quiz

9th - 12th Grade

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Science

12th Grade

Medium

Created by

Alex McCluskey

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an internal threat caused by employee sabotage or theft?

a) An employee steals a laptop containing sensitive data from the office.

b) An employee accidentally deletes a file from the server.

c) An employee visits a website that infects their computer with malware.

d) An employee shares their password with a colleague.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a social-engineering technique used to obtain secure information by deception?

a) A hacker sends an email pretending to be a legitimate company and asks the recipient to click on a link.

b) A hacker breaks into a network using a vulnerability in the software.

c) A hacker installs a keylogger on a computer to record the keystrokes of the user.

d) A hacker scans a network for open ports and services.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the malicious software that encrypts the files on a computer and demands a ransom for their decryption?

a) Spyware

b) Adware

c) Ransomware

d) Rootkit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of hacking that is motivated by political or ideological goals?

a) Commercial hacking

b) Government hacking

c) Individual hacking

d) Hacktivism

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an operational loss caused by a cyber attack?

a) A company loses its customers’ trust and loyalty.

b) A company pays a fine for violating data protection laws.

c) A company suffers a disruption in its production or service delivery.

d) A company loses its competitive edge or trade secrets.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of virus that replicates itself and spreads to other computers through a network?

a) Worm

b) Trojan

c) Rootkit

d) Keylogger

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process of determining the impact level of a successful cyber attack on an organisation?

a) Risk assessment

b) Risk management

c) Risk mitigation

d) Risk analysis

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the organisation that provides regular updates on the current and changing cyber threat landscape in the UK?

a) The National Cyber Security Centre (NCSC)

b) The Cyber Security Information Sharing Partnership (CiSP)

c) The Centre for the Protection of National Infrastructure (CPNI)

d) The Information Commissioner’s Office (ICO)

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of malware that hides itself from detection by antivirus software and gains administrator privileges on a computer?

a) Rootkit

b) Trojan

c) Keylogger

d) Spyware