Cyber Security Quiz

Cyber Security Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

Quiz on Hardware and Software Data Security

Quiz on Hardware and Software Data Security

Professional Development

15 Qs

Cybersecurity Awareness Quiz

Cybersecurity Awareness Quiz

Professional Development

15 Qs

Understanding Online Assessment

Understanding Online Assessment

Professional Development

10 Qs

Data Security: Top Threats to Data Protection Quiz

Data Security: Top Threats to Data Protection Quiz

Professional Development

15 Qs

Orientation Programme for Librarians -21st January 2024

Orientation Programme for Librarians -21st January 2024

Professional Development

10 Qs

Threat Intelligence

Threat Intelligence

Professional Development

17 Qs

Microsoft Office Suite Quiz

Microsoft Office Suite Quiz

Professional Development

10 Qs

LINGGO NG KABATAAN 2024

LINGGO NG KABATAAN 2024

Professional Development

14 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Others

Professional Development

Hard

Created by

Gezahegn Hailu

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of cyber security?

Protecting physical assets

Preventing unauthorized access to data

Enhancing network speed

Increasing software complexity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of the CIA Triad?

Confidentiality

Integrity

Authentication

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a Denial of Service (DoS) attack?

Disrupting access to a network or web resource

Gaining unauthorized access

Stealing sensitive data

Encrypting files

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves an intruder altering packet header addresses to redirect messages?

Eavesdropping

Traffic analysis

Message modification

Session replay

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself and attaches to host files or hard drive sectors?

Virus

Logic Bomb

Trojan horse

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the motive behind political cyber-attacks?

Making political statements

Destroying or disrupting targets

Theft of intellectual property

Fun and curiosity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic of a Trojan horse?

Can replicate itself

Disguised as legitimate software

Contains spying functions

Hidden in useful software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?