Cyber Security Quiz

Cyber Security Quiz

University

14 Qs

quiz-placeholder

Similar activities

Information System and Modern Organization part 1

Information System and Modern Organization part 1

University

14 Qs

Computer Basics 2 - CESA

Computer Basics 2 - CESA

7th Grade - University

10 Qs

Node.js

Node.js

University

10 Qs

WAN Sesi 1

WAN Sesi 1

1st Grade - University

10 Qs

Software Testing

Software Testing

University

10 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

C++ Array Quiz

C++ Array Quiz

University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Satheesh D

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Cyber Security?

To monitor social media activity

To create new software applications

To protect systems and data from cyber-attacks

To enhance internet speed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common type of cyber-attack?

Phishing

Software development

Data analysis

Network optimization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does encryption help to maintain?

Data speed

Data integrity

Data availability

Data privacy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a VPN used for?

To encrypt internet traffic

To store data in the cloud

To increase internet speed

To create websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for?

Communication, Integrity, Authentication

Confidentiality, Integrity, Availability

Confidentiality, Information, Access

Control, Information, Access

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a fundamental of Cyber Security?

Device Protection

Securing Online Connection

Data Analysis

Securing Email Communication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves pretending to be someone else?

Modification of messages

Masquerade

Denial of Service

Replay

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers