
Cybersecurity Quiz
Authored by Sheena Hunt
Computers
11th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is Phishing?
A type of malware that encrypts files and demands payment
The practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information
An attack that makes a machine or network resource unavailable to its intended users
Software designed to disrupt, damage, or gain unauthorized access to a computer system
Answer explanation
Phishing is the practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a characteristic of Ransomware?
It steals personal information for identity theft
It encrypts files and demands payment for the decryption key
It secretly records the keystrokes of the user
It is used to perform a distributed denial-of-service attack
Answer explanation
Ransomware encrypts files and demands payment for the decryption key, making it a characteristic of this type of malware.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
DDoS attacks are designed to:
Encrypt vital data and files until a ransom is paid
Send out fraudulent emails from a trusted entity
Prevent legitimate users from accessing a service
Exploit previously unknown vulnerabilities in software
Answer explanation
DDoS attacks are designed to prevent legitimate users from accessing a service, causing disruption by overwhelming the target with a flood of traffic.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Social engineering involves manipulating individuals into breaking security procedures.
True
False
Answer explanation
The statement is true because social engineering involves manipulating individuals to bypass security measures.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Zero-day exploits are attacks that occur after a security vulnerability has been fixed.
True
False
Answer explanation
Zero-day exploits actually occur before a security vulnerability is fixed, making the statement false.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Identify the cyber threat described as a malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
DDoS Attack
Spyware
Malware
Trojan Horse
Answer explanation
The correct choice is Malware, which is a malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
John receives an email from what seems to be his bank, asking him to update his personal information through a provided link. Suspecting this might be a scam, what should John do first?
Click on the link to see if it looks legitimate
Reply to the email asking for more details
Forward the email to his friends to get their opinion
Contact his bank through official channels to verify the email's legitimacy
Answer explanation
John should contact his bank through official channels to verify the email's legitimacy, as this is the safest way to confirm if the email is a scam or not.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Actividad 2 principios de transmisión 11°02 2024
Quiz
•
11th Grade
10 questions
Documentos Comerciales
Quiz
•
1st - 12th Grade
11 questions
2223_S4_ICT_1stExam_MCQ_Ex1
Quiz
•
9th - 12th Grade
10 questions
Star & Mesh Networks
Quiz
•
9th - 12th Grade
15 questions
Bimestral 2P
Quiz
•
11th Grade
15 questions
Imagen GIMP
Quiz
•
9th - 12th Grade
10 questions
Impresa e siti web
Quiz
•
8th - 12th Grade
15 questions
Class XI Basics
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade