Cybersecurity Essentials

Cybersecurity Essentials

University

20 Qs

quiz-placeholder

Similar activities

YEAR 7 MID-TERM  ASSESSMENT

YEAR 7 MID-TERM ASSESSMENT

7th Grade - University

20 Qs

Test

Test

University

15 Qs

Cryptology and Modern Network Security Quiz

Cryptology and Modern Network Security Quiz

University

24 Qs

TCP/IP Model Quiz

TCP/IP Model Quiz

University

15 Qs

Emerging Technologies

Emerging Technologies

University

20 Qs

Cybersecurity Essentials

Cybersecurity Essentials

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

dsf aef

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used by cybercriminals to trick individuals into providing sensitive information?

Spoofing

Phishing

Malware

Vishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption technique converts data into a code that can only be deciphered with a key?

Hashing

Symmetric encryption

Asymmetric encryption

Compression

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network security protocol is used to create secure connections over the internet?

Transport Layer Security (TLS)

Secure Socket Layer (SSL)

Simple Mail Transfer Protocol (SMTP)

Internet Protocol Security (IPsec)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method used by attackers to manipulate individuals into divulging confidential information?

Phishing

Malware

Social engineering

Spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended practice to enhance cybersecurity when creating passwords?

Using easily guessable information like birthdates

Using only lowercase letters

Use a combination of uppercase and lowercase letters, numbers, and special characters.

Using the same password for multiple accounts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of converting plaintext into unintelligible text for secure communication?

Decryption

Encoding

Encryption

Obfuscation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a type of attack where malicious actors send emails pretending to be from reputable sources to deceive recipients?

Spoofing

Phishing

Scamming

Fishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?