cp1410

cp1410

University

10 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

L8: Network security Defence in Depth

L8: Network security Defence in Depth

University

10 Qs

Information Security Principles

Information Security Principles

University

10 Qs

Ecommerce Security

Ecommerce Security

University

10 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

Chapter 12 : Private Security and Homeland Defense

Chapter 12 : Private Security and Homeland Defense

University

15 Qs

Unit 3 Cyber Security Case Study 2024

Unit 3 Cyber Security Case Study 2024

University

15 Qs

Chapter 5: Privacy

Chapter 5: Privacy

University

10 Qs

cp1410

cp1410

Assessment

Quiz

Computers

University

Easy

Created by

Phoebe Chung

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing and how can it be prevented?

Click on any link in an email without verifying the source

Respond to requests for personal information without confirming the legitimacy

Ignore any suspicious emails and open all attachments

Be cautious of unsolicited emails, not clicking on suspicious links, and verifying the legitimacy of requests for personal information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of spear phishing and provide an example.

An example of spear phishing is when a company sends out a mass email asking for personal information.

Spear phishing is a targeted form of phishing where the attacker customizes the message to a specific individual or organization. An example would be an email that appears to be from a colleague or supervisor, asking for sensitive information or to click on a malicious link.

Spear phishing is a type of fishing where people use spears to catch fish.

Spear phishing is a form of fishing that involves using a spear to catch a specific type of fish.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the common signs of malware infection on a computer?

Slow performance, frequent crashes, unusual pop-up messages, and unexplained changes to settings or files

No noticeable changes, no pop-up messages, fast performance, and no crashes

Frequent crashes, slow performance, no pop-up messages, and no changes to settings or files

Fast performance, infrequent crashes, normal pop-up messages, and explained changes to settings or files

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a user detect and remove malware from their system?

By downloading more malware to counteract the existing malware.

By clicking on suspicious pop-up ads and links.

By ignoring the malware and hoping it goes away on its own.

By using reputable antivirus software and keeping it updated.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the key components of a secure network?

Antivirus software, weak passwords, open network access

Outdated hardware, lack of employee training, no data backups

Firewalls, encryption, strong authentication, intrusion detection systems, and regular security updates

Public Wi-Fi, sharing passwords, using unsecured websites

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of firewall and its role in network security.

A firewall is a software used to enhance the speed of network traffic by bypassing security protocols.

A firewall is a physical barrier installed around the network to prevent unauthorized access.

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

A firewall is a type of computer virus that spreads through the network and compromises security.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data encryption and why is it important in cyber security?

Data encryption is the process of converting data into a physical form. It is important in cyber security to make data more accessible.

Data encryption is the process of converting data into a code to prevent unauthorized access. It is important in cyber security to protect sensitive information from being intercepted or accessed by hackers.

Data encryption is the process of converting data into a code to make it harder to read. It is important in cyber security to confuse users.

Data encryption is the process of converting data into a code to make it easier to share. It is important in cyber security to improve data transfer speed.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?