CYBERSECURITY QUIZ

CYBERSECURITY QUIZ

University

10 Qs

quiz-placeholder

Similar activities

S&T Quiz Bee - Round 3

S&T Quiz Bee - Round 3

University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

Phishing Quiz

Phishing Quiz

University

10 Qs

Basic Networking (Y8)

Basic Networking (Y8)

7th Grade - University

10 Qs

OSINT

OSINT

University

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Vectores de Ataque

Vectores de Ataque

University

10 Qs

SSL TLS

SSL TLS

University

11 Qs

CYBERSECURITY QUIZ

CYBERSECURITY QUIZ

Assessment

Quiz

Computers

University

Easy

Created by

FARAH AZMI

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the most common method for securing a Wi-Fi network?

Using a strong password

Disabling encryption

Broadcasting the SSID (network name)

Keeping the default network settings

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What are unwanted emails from bots and advertisers called?

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which program is designed to send advertisements, mostly as pop-ups?

Spyware

Adware

Spam

Keyloggers

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This cyber crime operates by secretly gathering information from a user's computer or device without their consent.

Adware

Virus

Spyware

Worm

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is used to record keystrokes done by users to steal passwords?

Keyloggers

Pharming

Phishing

Spyware

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A type of malware is designed to replicate itself and spread to other computers. It does not need to attach itself to an existing program or file.

Trojan Horse

Virus

Rootkit

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?