Y11 EC Principles of Cybersecurity Week 10 PreQuiz

Y11 EC Principles of Cybersecurity Week 10 PreQuiz

11th Grade

20 Qs

quiz-placeholder

Similar activities

CyberSafety Pre-Assessment

CyberSafety Pre-Assessment

KG - University

16 Qs

Computer Science Vocabulary

Computer Science Vocabulary

9th - 12th Grade

20 Qs

KHS CompTIA Fundamentals: Domain 4

KHS CompTIA Fundamentals: Domain 4

9th Grade - University

20 Qs

cyber security intro

cyber security intro

9th - 12th Grade

18 Qs

Y11 EC Principles of Cybersecurity Week 5 PreQuiz

Y11 EC Principles of Cybersecurity Week 5 PreQuiz

11th Grade

20 Qs

APCSP 2.1.1 - 2.1.3 Review

APCSP 2.1.1 - 2.1.3 Review

9th - 12th Grade

15 Qs

036_Supply Chain Vulnerabilities – CompTIA Security+

036_Supply Chain Vulnerabilities – CompTIA Security+

9th - 12th Grade

20 Qs

CYBERSECURITY EXAM

CYBERSECURITY EXAM

9th - 12th Grade

20 Qs

Y11 EC Principles of Cybersecurity Week 10 PreQuiz

Y11 EC Principles of Cybersecurity Week 10 PreQuiz

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Alex Song

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used in hacking?

Social Engineering

Network Scanning

Malware Insertion

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing typically involves:

Sending fake emails to trick recipients into revealing personal information.

Hacking into a system directly.

Physically stealing information from an office.

Disrupting network services.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'smishing'?

Phishing via social media.

Phishing via SMS.

Phishing via email.

Phishing via phone calls.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following actions by an employee can cause a vulnerability?

Using weak passwords.

Clicking on suspicious links.

Sharing confidential information.

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A common characteristic of a scam is:

High authenticity.

Requests for personal information.

Genuine URLs.

Secure connections.

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

What is a major risk of account access in social networking?

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Account behaviour monitoring helps in:

A) Enhancing user experience

B) Detecting unusual activity

C) Promoting posts

D) Increasing followers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?