Cybersecurity Fundamentals

Cybersecurity Fundamentals

University

10 Qs

quiz-placeholder

Similar activities

P2TL SESI-3

P2TL SESI-3

University

10 Qs

Lathe and Lathe work - Lesson 02

Lathe and Lathe work - Lesson 02

University

10 Qs

INTO Artificial Intelligence

INTO Artificial Intelligence

University - Professional Development

10 Qs

Term 1 Reflection

Term 1 Reflection

KG - Professional Development

11 Qs

PEC 200 quiz

PEC 200 quiz

University - Professional Development

10 Qs

CLB SAFC

CLB SAFC

University

13 Qs

Radio Interface

Radio Interface

University

15 Qs

Floor finishes

Floor finishes

University

10 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Assessment

Quiz

Professional Development

University

Easy

Created by

Lovelyn Santos

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a common method used by cybercriminals to trick individuals into providing sensitive information such as passwords or credit card details?

Phishing

Spoofing

Vishing

Smishing

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

How do firewalls help protect computer networks?

Firewalls are only effective against physical threats to the network.

Firewalls help increase network speed by removing security restrictions.

Firewalls help protect computer networks by filtering incoming and outgoing network traffic based on security rules.

Firewalls are used to track user activity on the network.

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the purpose of data encryption in cybersecurity?

Data encryption is used to increase the risk of data breaches

Data encryption is used to make data more accessible to unauthorized users

Data encryption is used to slow down data processing

Data encryption in cybersecurity is used to protect sensitive information by converting it into a code that can only be accessed with the correct decryption key.

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which protocol is commonly used to secure data transmission over the internet?

HTTPS

SMTP

FTP

HTTP

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is social engineering in the context of cybersecurity?

Social engineering is a type of software used to protect against cyber attacks.

Social engineering involves physical security measures to prevent unauthorized access.

Social engineering is a term used to describe the process of updating security protocols.

Social engineering is the manipulation of individuals to divulge confidential information or perform actions that compromise security.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are some best practices individuals can follow to enhance their cybersecurity?

Share passwords with friends and family

Click on suspicious links in emails

Never update software or operating systems

Use strong, unique passwords; enable two-factor authentication; keep software updated; be cautious of phishing emails; use reputable antivirus program; regularly back up data.

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the term for a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication?

phishing

vishing

fishing

smishing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?