Search Header Logo

Cyber Threats Quiz

Authored by Shelley Hibbert

Computers

10th Grade

Used 2+ times

Cyber Threats Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?

A type of malware that encrypts files

A legitimate way to verify user identities

A technique used to trick individuals into providing sensitive information

A method of strengthening network security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a Malware threat?

Two-factor authentication

Firewall

Virus

CAPTCHA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Social Engineering in the context of cyber security?

The process of improving social skills

The technical means to gain unauthorized access to a computer system

The use of deception to manipulate individuals into divulging confidential information

A method of encrypting data to protect it from theft

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a Denial of Service (DoS) attack?

To encrypt the target's files and demand a ransom

To steal sensitive information from the target

To make a computer or network resource unavailable to its intended users

To gain unauthorized access to a network

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes Ransomware?

A tool to detect network intrusions

A type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid

A method of securely transmitting data over the internet

A program that helps improve computer performance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Data Breach?

A method of compressing data to save space

A secure way to store data in the cloud

An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner

A technique for recovering lost data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Adware

Firewall

Spyware

Ransomware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?