Cyber Security Quiz

Cyber Security Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

KOE034: Sensors and Instruments

KOE034: Sensors and Instruments

Professional Development

11 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

Maintain Files and Folders

Maintain Files and Folders

Professional Development

10 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

Computer Hardware and Software Quiz

Computer Hardware and Software Quiz

Professional Development

10 Qs

MS Excel practice

MS Excel practice

Professional Development

18 Qs

UDC 2022

UDC 2022

Professional Development

10 Qs

Mastering KineMaster

Mastering KineMaster

Professional Development

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Stacey Do

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does CIA stand for?

conditioning, icing, and age

confidentiality, ink, and average

confidentiality, integrity, and availability

confidentiality, integrity, and able

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_________ is the process of converting plaintext into ciphertext to protect sensitive information from unauthorized access.

Encryption

Crypto

Password

Bitcoin

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following describes why it is important to update antivirus software regularly?

To protect your computer from all known viruses.

To ensure the software identifies old and recent viruses.

To protect your computer from unwanted bulk messages.

To prevent the spread of malicious programs on the Internet.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following describes a computer hacker?

A skilled programmer who uses authorized access to exploit the information available on a computer.

A skilled programmer who secretly invades computers without authorization.

A skilled programmer who writes programs to train new employees.

A skilled programmer who helps in the installation of new software for an organization.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following describes why firewalls are used?

To prevent unauthorized access by incoming transmissions.

To prevent the destruction of a computer in the event of a fire.

To enable easy downloading of data from websites.

To detect and disable viruses already on a computer.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following should you do to restrict access to your files and devices?

Update your software once a year.

Share passwords only with colleagues you trust.

Have your staff members access information via an open Wi-Fi network.

Use multi-factor authentication.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following statements about a password is TRUE?

It must be changed only if it is compromised.

It cannot contain special character symbols.

It must be registered with the system administrator.

It should be changed regularly.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?