
Cybersecurity Quiz
Quiz
•
Computers
•
12th Grade
•
Medium
DAVID LEON
Used 1+ times
FREE Resource
Enhance your content in a minute
61 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
A type of computer virus
A method of tricking users into giving away personal information using deceptive emails or websites
A technique used to physically secure a building
A program used to capture data over networks
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are viruses and spyware designed to do?
Protect personal information
Steal private information or infect your computer
Authorize secure building access
Listen to conversations
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does piggybacking refer to in the context of security attacks?
Creating deceptive web pages
Infecting computers with malware
An unauthorized person gaining access by following someone with authorization
Listening to private conversations
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is eavesdropping in the context of security?
Following an authorized person into a secure area
Using programs to capture data being transmitted over a network
Infecting a computer with a virus
Tricking users with a phishing attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a man-in-the-middle attack?
A type of malware that disguises as legitimate software.
An exploit of an operating system or software vulnerability that is unknown and unpatched by the author.
A technological attack where a malicious person intercepts network communications between two hosts.
A hacker sniffing packets between a client and a server to catch authentication information.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is commonly stolen during a man-in-the-middle attack?
Network connection cables.
Information such as credit cards and online bank credentials.
The physical hardware of a network.
The server's main database files.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a zero-day attack?
A hacker sniffing packets between a client and a server to catch authentication information.
A technological attack where a malicious person intercepts network communications between two hosts.
A type of malware that disguises as legitimate software.
An exploit of an operating system or software vulnerability that is unknown and unpatched by the author.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
60 questions
Finals in Empowerment Technologies
Quiz
•
11th - 12th Grade
59 questions
The Big Digital IT & General Knowledge Quiz
Quiz
•
9th Grade - University
56 questions
Social Media
Quiz
•
12th Grade
56 questions
Ôn tập kiểm tra giữa học kỳ 2
Quiz
•
9th - 12th Grade
59 questions
Working with Files
Quiz
•
8th - 12th Grade
59 questions
Latihan Soal DKV 2024
Quiz
•
12th Grade
60 questions
E-BOOK
Quiz
•
KG - University
60 questions
lists and dictionaries in python smsmb
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
