18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Network Security

Network Security

9th Grade

13 Qs

Basic cyber security knowledge

Basic cyber security knowledge

KG - University

9 Qs

Cyber Security Quiz

Cyber Security Quiz

11th Grade

13 Qs

Their Security Quiz

Their Security Quiz

12th Grade

11 Qs

Malware vocabulary

Malware vocabulary

9th - 12th Grade

9 Qs

Security of Data

Security of Data

9th - 11th Grade

15 Qs

Password Hacking Techniques

Password Hacking Techniques

9th Grade - University

14 Qs

Malware and Attack Technologies

Malware and Attack Technologies

9th - 12th Grade

12 Qs

18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

Assessment

Passage

Computers

9th - 12th Grade

Medium

Created by

Andy Workman

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of cybersecurity?

D. Protecting data from social engineering

A. Protecting only networks from unauthorized access

B. Protecting networks, computers, programs, and data from attack, damage, and unauthorized access

C. Protecting computers from malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering technique?

A. Virus

D. Spyware

B. Phishing

C. Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for any computer code written with the intent to cause damage, disruption, or inconvenience?

D. Authentication

B. Malware

A. Firewall

C. Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common security threat related to passwords?

A. Strong and unique passwords

D. Biometric authentication

B. Weak and default passwords

C. Multi-factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for any secondary storage device which can easily introduce harmful software to a network?

A. Optical disks

B. Memory cards

D. Portable desktop hard drives

C. USB pens

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the potential risk of using out-of-date software?

C. Vulnerability to malware

B. Enhanced security

A. Increased performance

D. Improved user experience

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a social engineering technique?

B. Phishing

A. Blagging

C. Shoulder surfing

D. Malware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?