Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

9 Qs

quiz-placeholder

Similar activities

Risk Assessments

Risk Assessments

12th Grade

12 Qs

Computer Coding

Computer Coding

KG - Professional Development

12 Qs

The concepts of networked society

The concepts of networked society

1st - 12th Grade

8 Qs

Risk Assessments

Risk Assessments

12th Grade - University

12 Qs

Perkembangan TIK untuk Siswa

Perkembangan TIK untuk Siswa

7th Grade - University

10 Qs

Industry 4.0

Industry 4.0

10th Grade - Professional Development

8 Qs

Week 1, Lock out Tag out

Week 1, Lock out Tag out

12th Grade

9 Qs

Digital & Questioned Docs Review

Digital & Questioned Docs Review

9th - 12th Grade

14 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Science

12th Grade

Medium

Created by

Alex McCluskey

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an internal threat caused by employee sabotage or theft?

a) An employee steals a laptop containing sensitive data from the office.

b) An employee accidentally deletes a file from the server.

c) An employee visits a website that infects their computer with malware.

d) An employee shares their password with a colleague.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a social-engineering technique used to obtain secure information by deception?

a) A hacker sends an email pretending to be a legitimate company and asks the recipient to click on a link.

b) A hacker breaks into a network using a vulnerability in the software.

c) A hacker installs a keylogger on a computer to record the keystrokes of the user.

d) A hacker scans a network for open ports and services.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the malicious software that encrypts the files on a computer and demands a ransom for their decryption?

a) Spyware

b) Adware

c) Ransomware

d) Rootkit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of hacking that is motivated by political or ideological goals?

a) Commercial hacking

b) Government hacking

c) Individual hacking

d) Hacktivism

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an operational loss caused by a cyber attack?

a) A company loses its customers’ trust and loyalty.

b) A company pays a fine for violating data protection laws.

c) A company suffers a disruption in its production or service delivery.

d) A company loses its competitive edge or trade secrets.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of virus that replicates itself and spreads to other computers through a network?

a) Worm

b) Trojan

c) Rootkit

d) Keylogger

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process of determining the impact level of a successful cyber attack on an organisation?

a) Risk assessment

b) Risk management

c) Risk mitigation

d) Risk analysis

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the organisation that provides regular updates on the current and changing cyber threat landscape in the UK?

a) The National Cyber Security Centre (NCSC)

b) The Cyber Security Information Sharing Partnership (CiSP)

c) The Centre for the Protection of National Infrastructure (CPNI)

d) The Information Commissioner’s Office (ICO)

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of malware that hides itself from detection by antivirus software and gains administrator privileges on a computer?

a) Rootkit

b) Trojan

c) Keylogger

d) Spyware