cp1410

cp1410

University

10 Qs

quiz-placeholder

Similar activities

Website Usability and UX

Website Usability and UX

University

10 Qs

Python Week 1 & 2

Python Week 1 & 2

University

10 Qs

OM_SBENT3C_Q2

OM_SBENT3C_Q2

University - Professional Development

15 Qs

Quiz 1: The background and history of IoT

Quiz 1: The background and history of IoT

University

10 Qs

Visual Basic 2010

Visual Basic 2010

8th Grade - University

10 Qs

Types of Mass Media

Types of Mass Media

10th Grade - Professional Development

11 Qs

Software dan Hardware

Software dan Hardware

University

10 Qs

Peranti Input Ouput

Peranti Input Ouput

University

10 Qs

cp1410

cp1410

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Phoebe Chung

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing and how can it be prevented?

Click on any link in an email without verifying the source

Respond to requests for personal information without confirming the legitimacy

Ignore any suspicious emails and open all attachments

Be cautious of unsolicited emails, not clicking on suspicious links, and verifying the legitimacy of requests for personal information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of spear phishing and provide an example.

An example of spear phishing is when a company sends out a mass email asking for personal information.

Spear phishing is a targeted form of phishing where the attacker customizes the message to a specific individual or organization. An example would be an email that appears to be from a colleague or supervisor, asking for sensitive information or to click on a malicious link.

Spear phishing is a type of fishing where people use spears to catch fish.

Spear phishing is a form of fishing that involves using a spear to catch a specific type of fish.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the common signs of malware infection on a computer?

Slow performance, frequent crashes, unusual pop-up messages, and unexplained changes to settings or files

No noticeable changes, no pop-up messages, fast performance, and no crashes

Frequent crashes, slow performance, no pop-up messages, and no changes to settings or files

Fast performance, infrequent crashes, normal pop-up messages, and explained changes to settings or files

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a user detect and remove malware from their system?

By downloading more malware to counteract the existing malware.

By clicking on suspicious pop-up ads and links.

By ignoring the malware and hoping it goes away on its own.

By using reputable antivirus software and keeping it updated.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the key components of a secure network?

Antivirus software, weak passwords, open network access

Outdated hardware, lack of employee training, no data backups

Firewalls, encryption, strong authentication, intrusion detection systems, and regular security updates

Public Wi-Fi, sharing passwords, using unsecured websites

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of firewall and its role in network security.

A firewall is a software used to enhance the speed of network traffic by bypassing security protocols.

A firewall is a physical barrier installed around the network to prevent unauthorized access.

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

A firewall is a type of computer virus that spreads through the network and compromises security.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data encryption and why is it important in cyber security?

Data encryption is the process of converting data into a physical form. It is important in cyber security to make data more accessible.

Data encryption is the process of converting data into a code to prevent unauthorized access. It is important in cyber security to protect sensitive information from being intercepted or accessed by hackers.

Data encryption is the process of converting data into a code to make it harder to read. It is important in cyber security to confuse users.

Data encryption is the process of converting data into a code to make it easier to share. It is important in cyber security to improve data transfer speed.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?