Cyber Security Quiz

Cyber Security Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

IT Bridge 2022 - Lesson 2 - Extra Practice

IT Bridge 2022 - Lesson 2 - Extra Practice

Professional Development

16 Qs

IT ENGLISH: Research Project Topics - Computer Ethics

IT ENGLISH: Research Project Topics - Computer Ethics

Professional Development

10 Qs

ITF - Quiz 5.1 - Selecting a Computer

ITF - Quiz 5.1 - Selecting a Computer

Professional Development

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Hardware

Hardware

Professional Development

12 Qs

IT ENGLISH: Research Project Topics - Memory & Storage

IT ENGLISH: Research Project Topics - Memory & Storage

Professional Development

10 Qs

Business Processes - Lesson 2 - Info Security Req's

Business Processes - Lesson 2 - Info Security Req's

Professional Development

12 Qs

Chapter 4 Quiz

Chapter 4 Quiz

Professional Development

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Stacey Do

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does CIA stand for?

conditioning, icing, and age

confidentiality, ink, and average

confidentiality, integrity, and availability

confidentiality, integrity, and able

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_________ is the process of converting plaintext into ciphertext to protect sensitive information from unauthorized access.

Encryption

Crypto

Password

Bitcoin

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following describes why it is important to update antivirus software regularly?

To protect your computer from all known viruses.

To ensure the software identifies old and recent viruses.

To protect your computer from unwanted bulk messages.

To prevent the spread of malicious programs on the Internet.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following describes a computer hacker?

A skilled programmer who uses authorized access to exploit the information available on a computer.

A skilled programmer who secretly invades computers without authorization.

A skilled programmer who writes programs to train new employees.

A skilled programmer who helps in the installation of new software for an organization.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following describes why firewalls are used?

To prevent unauthorized access by incoming transmissions.

To prevent the destruction of a computer in the event of a fire.

To enable easy downloading of data from websites.

To detect and disable viruses already on a computer.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following should you do to restrict access to your files and devices?

Update your software once a year.

Share passwords only with colleagues you trust.

Have your staff members access information via an open Wi-Fi network.

Use multi-factor authentication.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following statements about a password is TRUE?

It must be changed only if it is compromised.

It cannot contain special character symbols.

It must be registered with the system administrator.

It should be changed regularly.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?