Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

9 Qs

quiz-placeholder

Similar activities

metodología de la investigación

metodología de la investigación

12th Grade

12 Qs

La matière dans l'univers

La matière dans l'univers

12th Grade

14 Qs

1.Principios de Sostenibilidad

1.Principios de Sostenibilidad

12th Grade

9 Qs

UMatériel Fiche 5 : Propriétés «Caractéristiques à identifier»

UMatériel Fiche 5 : Propriétés «Caractéristiques à identifier»

8th Grade - University

11 Qs

Onde vivimos e en que traballamos?

Onde vivimos e en que traballamos?

1st - 12th Grade

12 Qs

DRRR Q4

DRRR Q4

12th Grade

10 Qs

MCCB Quiz

MCCB Quiz

12th Grade

10 Qs

Sience

Sience

1st Grade - Professional Development

7 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Science

12th Grade

Practice Problem

Medium

Created by

Alex McCluskey

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an internal threat caused by employee sabotage or theft?

a) An employee steals a laptop containing sensitive data from the office.

b) An employee accidentally deletes a file from the server.

c) An employee visits a website that infects their computer with malware.

d) An employee shares their password with a colleague.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a social-engineering technique used to obtain secure information by deception?

a) A hacker sends an email pretending to be a legitimate company and asks the recipient to click on a link.

b) A hacker breaks into a network using a vulnerability in the software.

c) A hacker installs a keylogger on a computer to record the keystrokes of the user.

d) A hacker scans a network for open ports and services.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the malicious software that encrypts the files on a computer and demands a ransom for their decryption?

a) Spyware

b) Adware

c) Ransomware

d) Rootkit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of hacking that is motivated by political or ideological goals?

a) Commercial hacking

b) Government hacking

c) Individual hacking

d) Hacktivism

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an operational loss caused by a cyber attack?

a) A company loses its customers’ trust and loyalty.

b) A company pays a fine for violating data protection laws.

c) A company suffers a disruption in its production or service delivery.

d) A company loses its competitive edge or trade secrets.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the type of virus that replicates itself and spreads to other computers through a network?

a) Worm

b) Trojan

c) Rootkit

d) Keylogger

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process of determining the impact level of a successful cyber attack on an organisation?

a) Risk assessment

b) Risk management

c) Risk mitigation

d) Risk analysis

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?