Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

61 Qs

quiz-placeholder

Similar activities

Building Materials

Building Materials

10th - 12th Grade

58 Qs

Emmbed System

Emmbed System

12th Grade

60 Qs

CompTia 1001 Exam Review

CompTia 1001 Exam Review

10th Grade - University

56 Qs

Intro to Computer Science Unit 1 Test Form C

Intro to Computer Science Unit 1 Test Form C

9th - 12th Grade

60 Qs

Python Programlama Dili - Lise FULL

Python Programlama Dili - Lise FULL

9th - 12th Grade

61 Qs

Computer Science Unit 1-4

Computer Science Unit 1-4

9th - 12th Grade

59 Qs

Computer Awareness - 8

Computer Awareness - 8

12th Grade

60 Qs

Asas Sains Komputer 2018

Asas Sains Komputer 2018

1st - 12th Grade

65 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

12th Grade

Medium

Created by

DAVID LEON

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

61 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A type of computer virus

A method of tricking users into giving away personal information using deceptive emails or websites

A technique used to physically secure a building

A program used to capture data over networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are viruses and spyware designed to do?

Protect personal information

Steal private information or infect your computer

Authorize secure building access

Listen to conversations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does piggybacking refer to in the context of security attacks?

Creating deceptive web pages

Infecting computers with malware

An unauthorized person gaining access by following someone with authorization

Listening to private conversations

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is eavesdropping in the context of security?

Following an authorized person into a secure area

Using programs to capture data being transmitted over a network

Infecting a computer with a virus

Tricking users with a phishing attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a man-in-the-middle attack?

A type of malware that disguises as legitimate software.

An exploit of an operating system or software vulnerability that is unknown and unpatched by the author.

A technological attack where a malicious person intercepts network communications between two hosts.

A hacker sniffing packets between a client and a server to catch authentication information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is commonly stolen during a man-in-the-middle attack?

Network connection cables.

Information such as credit cards and online bank credentials.

The physical hardware of a network.

The server's main database files.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day attack?

A hacker sniffing packets between a client and a server to catch authentication information.

A technological attack where a malicious person intercepts network communications between two hosts.

A type of malware that disguises as legitimate software.

An exploit of an operating system or software vulnerability that is unknown and unpatched by the author.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?