Search Header Logo

Cybersecurity Quiz

Authored by Alex McCluskey

Science

12th Grade

Used 1+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an internal threat caused by employee sabotage or theft?

a) An employee steals a laptop containing sensitive data from the office.

b) An employee accidentally deletes a file from the server.

c) An employee visits a website that infects their computer with malware.

d) An employee shares their password with a colleague.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a social-engineering technique used to obtain secure information by deception?

a) A hacker sends an email pretending to be a legitimate company and asks the recipient to click on a link.

b) A hacker breaks into a network using a vulnerability in the software.

c) A hacker installs a keylogger on a computer to record the keystrokes of the user.

d) A hacker scans a network for open ports and services.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the malicious software that encrypts the files on a computer and demands a ransom for their decryption?

a) Spyware

b) Adware

c) Ransomware

d) Rootkit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of hacking that is motivated by political or ideological goals?

a) Commercial hacking

b) Government hacking

c) Individual hacking

d) Hacktivism

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an operational loss caused by a cyber attack?

a) A company loses its customers’ trust and loyalty.

b) A company pays a fine for violating data protection laws.

c) A company suffers a disruption in its production or service delivery.

d) A company loses its competitive edge or trade secrets.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of virus that replicates itself and spreads to other computers through a network?

a) Worm

b) Trojan

c) Rootkit

d) Keylogger

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process of determining the impact level of a successful cyber attack on an organisation?

a) Risk assessment

b) Risk management

c) Risk mitigation

d) Risk analysis

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?