Cyber Security Quiz

Cyber Security Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

OSI Model - Data Link Layer

OSI Model - Data Link Layer

9th Grade - Professional Development

10 Qs

Encryption

Encryption

Professional Development

15 Qs

M6; QUIZ LESSON 2

M6; QUIZ LESSON 2

Professional Development

10 Qs

Basic Introduction Of hacking

Basic Introduction Of hacking

Professional Development

10 Qs

Intro to Cybersecurity 3

Intro to Cybersecurity 3

12th Grade - Professional Development

12 Qs

Quiz on Operating System Services

Quiz on Operating System Services

Professional Development

15 Qs

IT General Control

IT General Control

Professional Development

10 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Stacey Do

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does CIA stand for?

conditioning, icing, and age

confidentiality, ink, and average

confidentiality, integrity, and availability

confidentiality, integrity, and able

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_________ is the process of converting plaintext into ciphertext to protect sensitive information from unauthorized access.

Encryption

Crypto

Password

Bitcoin

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following describes why it is important to update antivirus software regularly?

To protect your computer from all known viruses.

To ensure the software identifies old and recent viruses.

To protect your computer from unwanted bulk messages.

To prevent the spread of malicious programs on the Internet.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following describes a computer hacker?

A skilled programmer who uses authorized access to exploit the information available on a computer.

A skilled programmer who secretly invades computers without authorization.

A skilled programmer who writes programs to train new employees.

A skilled programmer who helps in the installation of new software for an organization.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following describes why firewalls are used?

To prevent unauthorized access by incoming transmissions.

To prevent the destruction of a computer in the event of a fire.

To enable easy downloading of data from websites.

To detect and disable viruses already on a computer.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following should you do to restrict access to your files and devices?

Update your software once a year.

Share passwords only with colleagues you trust.

Have your staff members access information via an open Wi-Fi network.

Use multi-factor authentication.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following statements about a password is TRUE?

It must be changed only if it is compromised.

It cannot contain special character symbols.

It must be registered with the system administrator.

It should be changed regularly.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?