Search Header Logo

Cyber Security Quiz

Authored by Dharmishtha Shah

Computers

7th Grade

Used 20+ times

Cyber Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the punishment in India for stealing computer documents, assets or any software's source code from any organization, individual, or from any other means?

6 months of imprisonment and a fine of Rs. 50,000

1 year of imprisonment and a fine of Rs. 100,000

2 years of imprisonment and a fine of Rs. 250,000

3 years of imprisonment and a fine of Rs. 500,000

Answer explanation

The punishment for stealing computer documents, assets, or software's source code in India is 3 years of imprisonment and a fine of Rs. 500,000.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

McAfee is an example of

Photo Editing Software

Quick Heal

Virus

Antivirus

Answer explanation

McAfee is an example of an Antivirus software, not a Photo Editing Software, Quick Heal, or a Virus.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Accessing Wi-Fi dishonestly is a cyber-crime.

True

False

Answer explanation

Accessing Wi-Fi dishonestly is considered a cyber-crime, making the statement true.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does cyber security protect?

Cyber security protects criminals

Cyber security protects internet-connected systems

Cyber security protects hackers

None of the mentioned

Answer explanation

Cyber security protects internet-connected systems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber-crime can be categorized into ________ types.

4

3

2

6

Answer explanation

Cyber-crime can be categorized into 4 types, as mentioned in the question.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ are the special type of programs used for recording and tracking user's keystroke.

Keylogger

Trojans

Virus

Worms

Answer explanation

Keyloggers are the special type of programs used for recording and tracking user's keystrokes, making it the correct choice.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

Cyber attack

Computer security

Cryptography

Digital hacking

Answer explanation

A cyber attack is defined as an attempt to steal, spy, damage, or destroy computer systems, networks, or their associated information.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?