Search Header Logo

Cybersecurity Quiz

Authored by Sheena Hunt

Computers

11th Grade

Used 3+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is Phishing?

A type of malware that encrypts files and demands payment

The practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information

An attack that makes a machine or network resource unavailable to its intended users

Software designed to disrupt, damage, or gain unauthorized access to a computer system

Answer explanation

Phishing is the practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a characteristic of Ransomware?

It steals personal information for identity theft

It encrypts files and demands payment for the decryption key

It secretly records the keystrokes of the user

It is used to perform a distributed denial-of-service attack

Answer explanation

Ransomware encrypts files and demands payment for the decryption key, making it a characteristic of this type of malware.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

DDoS attacks are designed to:

Encrypt vital data and files until a ransom is paid

Send out fraudulent emails from a trusted entity

Prevent legitimate users from accessing a service

Exploit previously unknown vulnerabilities in software

Answer explanation

DDoS attacks are designed to prevent legitimate users from accessing a service, causing disruption by overwhelming the target with a flood of traffic.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Social engineering involves manipulating individuals into breaking security procedures.

True

False

Answer explanation

The statement is true because social engineering involves manipulating individuals to bypass security measures.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Zero-day exploits are attacks that occur after a security vulnerability has been fixed.

True

False

Answer explanation

Zero-day exploits actually occur before a security vulnerability is fixed, making the statement false.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Identify the cyber threat described as a malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

DDoS Attack

Spyware

Malware

Trojan Horse

Answer explanation

The correct choice is Malware, which is a malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

John receives an email from what seems to be his bank, asking him to update his personal information through a provided link. Suspecting this might be a scam, what should John do first?

Click on the link to see if it looks legitimate

Reply to the email asking for more details

Forward the email to his friends to get their opinion

Contact his bank through official channels to verify the email's legitimacy

Answer explanation

John should contact his bank through official channels to verify the email's legitimacy, as this is the safest way to confirm if the email is a scam or not.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?