Search Header Logo

Cybersecurity Formative Assessment

Authored by chris jackman

Computers

12th Grade

Used 2+ times

Cybersecurity Formative Assessment
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main objective of encryption in cybersecurity?

To increase system speed

To protect data from unauthorised access

To reduce the cost of storage

To simplify network configurations

Answer explanation

The main objective of encryption in cybersecurity is to protect data from unauthorized access, ensuring that sensitive information remains confidential and secure from potential threats.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered an internal threat?

Phishing attacks

Malware infections

Employee sabotage

Denial of Service (DoS) attacks

Answer explanation

Employee sabotage is an internal threat as it involves actions taken by individuals within the organization to harm its operations or reputation. In contrast, phishing, malware, and DoS attacks are typically external threats.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SQL injection target?

Network routers

Web applications

Operating systems

Personal devices

Answer explanation

SQL injection primarily targets web applications by exploiting vulnerabilities in their database interaction. Attackers can manipulate SQL queries to gain unauthorized access or manipulate data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of network types, what does WAN stand for?

Wide Area Network

Wireless Access Network

Wired Access Network

Web Application Network

Answer explanation

WAN stands for Wide Area Network, which refers to a telecommunications network that extends over a large geographical area, connecting multiple smaller networks. This distinguishes it from other options like Wireless Access Network.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a physical security measure?

Anti-virus software

Firewall configuration

CCTV installation

Data encryption

Answer explanation

CCTV installation is a physical security measure that involves using cameras to monitor and protect physical spaces. In contrast, anti-virus software, firewall configuration, and data encryption are all cybersecurity measures.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall in network security?

To increase internet speed

To block unwanted network traffic

To store backup data

To create user accounts

Answer explanation

A firewall's primary purpose is to block unwanted network traffic, acting as a barrier between trusted and untrusted networks. This helps protect systems from unauthorized access and potential threats.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself to spread to other computers?

Trojan horse

Worm

Spyware

Answer explanation

A worm is a type of malware that can replicate itself and spread to other computers without user intervention. Unlike a Trojan horse, which disguises itself, or spyware, which collects information, worms actively propagate.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?