Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

50 Qs

quiz-placeholder

Similar activities

City & Guilds Certificate in Network & Architecture Assessment

City & Guilds Certificate in Network & Architecture Assessment

12th Grade

50 Qs

Konsentrasi Keahlian TKJ

Konsentrasi Keahlian TKJ

12th Grade - University

53 Qs

1st Long Quiz 2nd Sem

1st Long Quiz 2nd Sem

12th Grade

45 Qs

Internet Infrastructure

Internet Infrastructure

11th Grade - University

45 Qs

Studio - U3 - LO4-4.1 Responding to an incident

Studio - U3 - LO4-4.1 Responding to an incident

12th Grade

54 Qs

IT Fundamentals Test Part 1

IT Fundamentals Test Part 1

KG - University

49 Qs

ITF+ 6.1 to 6.4  Security Concepts

ITF+ 6.1 to 6.4 Security Concepts

12th Grade

50 Qs

Networking - Practice Test #1

Networking - Practice Test #1

9th Grade - University

47 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Joshua Morrissette

Used 12+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the act of pretending to be something or someone other than yourself in order to deceive others in a security context?

Repudiation

Spoofing

Tampering

Information disclosure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a botnet?

A method of erasing data using a magnetic field

A single compromised computer used by an attacker

An aggregation of compromised computers used by attackers

A security policy violation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a form of computer fraud involving the intentional falsification of numbers in data entry?

Data diddling

Data destruction

Overwriting data

Degaussing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main intent of a Distributed Denial of Service (DDoS) attack?

To change the format of data

To physically destroy system equipment

To send more requests to a machine than it can handle, blocking user services

To quickly delete basic junk files from the computer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'elevation of privilege' refer to in a security context?

Destroying data on hard drives with special software

Allowing someone to do something they are not authorized to do

Providing information to someone not authorized to have it

Claiming you didn't do something or were not responsible

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of information security?

A) A technical method for gaining unauthorized access to information

B) A low-technology confidence trick used for attacking information systems

C) A type of computer virus that steals data

D) A firewall feature that protects against external threats

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic that distinguishes malware from defective software?

A) Malware is software with a legitimate purpose but contains harmful programs

B) Malware is designed to infiltrate or damage a system without the owner's consent

C) Defective software is intentionally created to cause harm

D) Malware is always a type of computer virus

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?