Cybersecurity

Cybersecurity

University

10 Qs

quiz-placeholder

Similar activities

Types of Mass Media

Types of Mass Media

10th Grade - Professional Development

11 Qs

Student Induction Program - ICT

Student Induction Program - ICT

University

11 Qs

Recalling Computing

Recalling Computing

University

10 Qs

Work Online Quiz

Work Online Quiz

University

10 Qs

4 week assessment 2025

4 week assessment 2025

7th Grade - University

15 Qs

Chapter 1 - Introduction to Information Technology

Chapter 1 - Introduction to Information Technology

University

10 Qs

GK Quiz

GK Quiz

University

15 Qs

Session 1 (intro to AI) | C

Session 1 (intro to AI) | C

University

10 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

University

Hard

Created by

Lanz Nieva

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A type of social gathering

A method of tricking individuals into revealing sensitive information

A computer virus

A type of encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering?

Installing antivirus software

Sending deceptive emails to obtain passwords

Updating operating systems regularly

Using a firewall to protect against hackers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomware is a type of malicious software that:

Steals credit card information

Encrypts files and demands payment for their release

Deletes system files

Spreads through social media platforms

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of malware?

To improve computer performance

To steal personal information

To enhance cybersecurity

To provide free software to users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can users protect themselves from phishing attacks?

Click on links in emails without verifying the sender

Share personal information freely on social media

Ignore suspicious emails and not click on unknown links

Provide banking details to anyone who asks for them

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common social engineering tactic?

Impersonating a trusted individual or organization

Offering free software downloads

Creating a sense of urgency or fear

Sending malicious attachments via email

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action if you suspect you have fallen victim to ransomware?

Pay the ransom immediately to regain access to your files

Contact law enforcement and report the incident

Disconnect the infected device from the internet and seek professional assistance

Ignore the situation and hope it resolves itself

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?