18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

PowerPoint 1

PowerPoint 1

12th Grade - University

10 Qs

Intro to Robotics

Intro to Robotics

9th Grade

14 Qs

[Lớp 12] Access - Ôn tập

[Lớp 12] Access - Ôn tập

12th Grade

14 Qs

Tập huấn kỹ năng CNTT trong dạy học trực tuyến 2021

Tập huấn kỹ năng CNTT trong dạy học trực tuyến 2021

1st - 10th Grade

10 Qs

Bimestral 2P

Bimestral 2P

11th Grade

15 Qs

informatika

informatika

10th Grade

15 Qs

kuis tools coreldraw

kuis tools coreldraw

10th Grade

15 Qs

Office 365

Office 365

12th Grade

10 Qs

18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

Assessment

Passage

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Andy Workman

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of cybersecurity?

D. Protecting data from social engineering

A. Protecting only networks from unauthorized access

B. Protecting networks, computers, programs, and data from attack, damage, and unauthorized access

C. Protecting computers from malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering technique?

A. Virus

D. Spyware

B. Phishing

C. Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for any computer code written with the intent to cause damage, disruption, or inconvenience?

D. Authentication

B. Malware

A. Firewall

C. Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common security threat related to passwords?

A. Strong and unique passwords

D. Biometric authentication

B. Weak and default passwords

C. Multi-factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for any secondary storage device which can easily introduce harmful software to a network?

A. Optical disks

B. Memory cards

D. Portable desktop hard drives

C. USB pens

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the potential risk of using out-of-date software?

C. Vulnerability to malware

B. Enhanced security

A. Increased performance

D. Improved user experience

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a social engineering technique?

B. Phishing

A. Blagging

C. Shoulder surfing

D. Malware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?