Cybersecurity Fundamentals

Cybersecurity Fundamentals

University

10 Qs

quiz-placeholder

Similar activities

ACCT  Skills for Real World Survival due Sept 16

ACCT Skills for Real World Survival due Sept 16

8th Grade - Professional Development

13 Qs

Audit CIS Games

Audit CIS Games

University

10 Qs

Data Ethics. Inroduction

Data Ethics. Inroduction

University

13 Qs

Secure SDLC @ BiS

Secure SDLC @ BiS

University

13 Qs

CNS Unit-1

CNS Unit-1

University

10 Qs

Business Analytics - Session 2

Business Analytics - Session 2

University

15 Qs

Cloud Infra and Security PU

Cloud Infra and Security PU

University

5 Qs

Pelayanan Publik Digital

Pelayanan Publik Digital

University

15 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Assessment

Quiz

Professional Development

University

Easy

Created by

Lovelyn Santos

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a common method used by cybercriminals to trick individuals into providing sensitive information such as passwords or credit card details?

Phishing

Spoofing

Vishing

Smishing

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

How do firewalls help protect computer networks?

Firewalls are only effective against physical threats to the network.

Firewalls help increase network speed by removing security restrictions.

Firewalls help protect computer networks by filtering incoming and outgoing network traffic based on security rules.

Firewalls are used to track user activity on the network.

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the purpose of data encryption in cybersecurity?

Data encryption is used to increase the risk of data breaches

Data encryption is used to make data more accessible to unauthorized users

Data encryption is used to slow down data processing

Data encryption in cybersecurity is used to protect sensitive information by converting it into a code that can only be accessed with the correct decryption key.

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which protocol is commonly used to secure data transmission over the internet?

HTTPS

SMTP

FTP

HTTP

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is social engineering in the context of cybersecurity?

Social engineering is a type of software used to protect against cyber attacks.

Social engineering involves physical security measures to prevent unauthorized access.

Social engineering is a term used to describe the process of updating security protocols.

Social engineering is the manipulation of individuals to divulge confidential information or perform actions that compromise security.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are some best practices individuals can follow to enhance their cybersecurity?

Share passwords with friends and family

Click on suspicious links in emails

Never update software or operating systems

Use strong, unique passwords; enable two-factor authentication; keep software updated; be cautious of phishing emails; use reputable antivirus program; regularly back up data.

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the term for a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication?

phishing

vishing

fishing

smishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?