CYBERSECURITY QUIZ

CYBERSECURITY QUIZ

University

10 Qs

quiz-placeholder

Similar activities

Process modeling

Process modeling

University

10 Qs

 QUIZ  MS Core Java Quiz-3 2023

QUIZ MS Core Java Quiz-3 2023

University

11 Qs

QUIZ GAME

QUIZ GAME

University

10 Qs

Redes de computadoras Topologías

Redes de computadoras Topologías

University

10 Qs

computer Networks

computer Networks

University

10 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

DCN5511: Chapter 5 - 7

DCN5511: Chapter 5 - 7

University

15 Qs

Structured/Traditional SDM

Structured/Traditional SDM

University

9 Qs

CYBERSECURITY QUIZ

CYBERSECURITY QUIZ

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

FARAH AZMI

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the most common method for securing a Wi-Fi network?

Using a strong password

Disabling encryption

Broadcasting the SSID (network name)

Keeping the default network settings

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What are unwanted emails from bots and advertisers called?

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which program is designed to send advertisements, mostly as pop-ups?

Spyware

Adware

Spam

Keyloggers

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This cyber crime operates by secretly gathering information from a user's computer or device without their consent.

Adware

Virus

Spyware

Worm

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is used to record keystrokes done by users to steal passwords?

Keyloggers

Pharming

Phishing

Spyware

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A type of malware is designed to replicate itself and spread to other computers. It does not need to attach itself to an existing program or file.

Trojan Horse

Virus

Rootkit

Worm

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers