Search Header Logo

Cybersecurity Quiz

Authored by Joshua Morrissette

Computers

12th Grade

Used 23+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the act of pretending to be something or someone other than yourself in order to deceive others in a security context?

Repudiation

Spoofing

Tampering

Information disclosure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a botnet?

A method of erasing data using a magnetic field

A single compromised computer used by an attacker

An aggregation of compromised computers used by attackers

A security policy violation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a form of computer fraud involving the intentional falsification of numbers in data entry?

Data diddling

Data destruction

Overwriting data

Degaussing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main intent of a Distributed Denial of Service (DDoS) attack?

To change the format of data

To physically destroy system equipment

To send more requests to a machine than it can handle, blocking user services

To quickly delete basic junk files from the computer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'elevation of privilege' refer to in a security context?

Destroying data on hard drives with special software

Allowing someone to do something they are not authorized to do

Providing information to someone not authorized to have it

Claiming you didn't do something or were not responsible

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of information security?

A) A technical method for gaining unauthorized access to information

B) A low-technology confidence trick used for attacking information systems

C) A type of computer virus that steals data

D) A firewall feature that protects against external threats

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic that distinguishes malware from defective software?

A) Malware is software with a legitimate purpose but contains harmful programs

B) Malware is designed to infiltrate or damage a system without the owner's consent

C) Defective software is intentionally created to cause harm

D) Malware is always a type of computer virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?