18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Security II

Security II

11th Grade

15 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

11th Grade

13 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Network Security Threats Quiz

Network Security Threats Quiz

10th Grade

13 Qs

3.6 - Cyber Security

3.6 - Cyber Security

10th Grade

15 Qs

Cybersecurity and Global Impacts _code.org U8

Cybersecurity and Global Impacts _code.org U8

9th Grade

12 Qs

Y8 Computer crime 2

Y8 Computer crime 2

7th - 9th Grade

10 Qs

18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

Assessment

Passage

Computers

9th - 12th Grade

Medium

Created by

Andy Workman

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of cybersecurity?

D. Protecting data from social engineering

A. Protecting only networks from unauthorized access

B. Protecting networks, computers, programs, and data from attack, damage, and unauthorized access

C. Protecting computers from malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering technique?

A. Virus

D. Spyware

B. Phishing

C. Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for any computer code written with the intent to cause damage, disruption, or inconvenience?

D. Authentication

B. Malware

A. Firewall

C. Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common security threat related to passwords?

A. Strong and unique passwords

D. Biometric authentication

B. Weak and default passwords

C. Multi-factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for any secondary storage device which can easily introduce harmful software to a network?

A. Optical disks

B. Memory cards

D. Portable desktop hard drives

C. USB pens

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the potential risk of using out-of-date software?

C. Vulnerability to malware

B. Enhanced security

A. Increased performance

D. Improved user experience

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a social engineering technique?

B. Phishing

A. Blagging

C. Shoulder surfing

D. Malware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?