Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

61 Qs

quiz-placeholder

Similar activities

Topic 4.2, 4.3, 4.4, 4.5

Topic 4.2, 4.3, 4.4, 4.5

12th Grade

66 Qs

MIL 1st Quarter Exam

MIL 1st Quarter Exam

11th - 12th Grade

60 Qs

TEST FINAL EXCEL - a 11-a

TEST FINAL EXCEL - a 11-a

10th Grade - University

57 Qs

Repaso final-1ro B-Tarea

Repaso final-1ro B-Tarea

7th - 12th Grade

60 Qs

Ujian Pendalaman Materi

Ujian Pendalaman Materi

12th Grade

60 Qs

HTML, CSS, and Design

HTML, CSS, and Design

6th - 12th Grade

59 Qs

PH INFOR KELAS X

PH INFOR KELAS X

2nd Grade - University

56 Qs

Mrežna oprema

Mrežna oprema

10th - 12th Grade

57 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

12th Grade

Medium

Created by

DAVID LEON

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

61 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A type of computer virus

A method of tricking users into giving away personal information using deceptive emails or websites

A technique used to physically secure a building

A program used to capture data over networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are viruses and spyware designed to do?

Protect personal information

Steal private information or infect your computer

Authorize secure building access

Listen to conversations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does piggybacking refer to in the context of security attacks?

Creating deceptive web pages

Infecting computers with malware

An unauthorized person gaining access by following someone with authorization

Listening to private conversations

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is eavesdropping in the context of security?

Following an authorized person into a secure area

Using programs to capture data being transmitted over a network

Infecting a computer with a virus

Tricking users with a phishing attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a man-in-the-middle attack?

A type of malware that disguises as legitimate software.

An exploit of an operating system or software vulnerability that is unknown and unpatched by the author.

A technological attack where a malicious person intercepts network communications between two hosts.

A hacker sniffing packets between a client and a server to catch authentication information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is commonly stolen during a man-in-the-middle attack?

Network connection cables.

Information such as credit cards and online bank credentials.

The physical hardware of a network.

The server's main database files.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day attack?

A hacker sniffing packets between a client and a server to catch authentication information.

A technological attack where a malicious person intercepts network communications between two hosts.

A type of malware that disguises as legitimate software.

An exploit of an operating system or software vulnerability that is unknown and unpatched by the author.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?