cybersecurity

cybersecurity

University

7 Qs

quiz-placeholder

Similar activities

INTRODUCCION A LA PROGRAMACION

INTRODUCCION A LA PROGRAMACION

6th Grade - University

10 Qs

Network Management Week 14

Network Management Week 14

University

10 Qs

Testeo de equipos - BIOS

Testeo de equipos - BIOS

University

10 Qs

How Safe are you? (Disclaimer: I do not own these questions)

How Safe are you? (Disclaimer: I do not own these questions)

University

10 Qs

QUIZZ 1 : DATABASE FUNDAMENTALS

QUIZZ 1 : DATABASE FUNDAMENTALS

University

10 Qs

Modulo 3. Interconexión de dispositivos

Modulo 3. Interconexión de dispositivos

University

10 Qs

Determining System Requirements

Determining System Requirements

University

11 Qs

INTO Artificial Intelligence

INTO Artificial Intelligence

University - Professional Development

10 Qs

cybersecurity

cybersecurity

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Joana Neves

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common type of cyber attack?

Phishing

Malware

Denial of Service (DoS)

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "ransomware" do to a victim's files?

Deletes them permanently

Encrypts them, demanding payment for decryption

Sends them to a hacker

Erases them slowly over time

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines "phishing"?

Using a network of computers to overwhelm a website

Hijacking a person’s web browser

Deceiving individuals into revealing personal information via email or fake websites

Installing malicious software on a victim's computer without their knowledge

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a "zero-day" vulnerability?

A flaw in software or hardware that is publicly known

A security hole discovered by the software vendor

An unknown vulnerability that hackers exploit before a patch is developed

A computer system that’s completely secure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered social engineering?

Infecting a website with malware

Convincing someone to reveal their login information by pretending to be an IT professional

Launching a distributed denial-of-service (DDoS) attack

Hacking into a network through weak encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of encryption in cybersecurity?

To speed up data transmission

To protect data by making it unreadable without a key

To prevent software from being updated

To allow hackers to gain access to data more easily

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "malware" refer to?

Software designed to protect against cyber threats

Any software intentionally designed to cause damage to a computer system

Programs that enhance system performance

Software that is used for data backup

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers