Cyber Security Quiz

Cyber Security Quiz

University

14 Qs

quiz-placeholder

Similar activities

Ice Break 2

Ice Break 2

University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

Information Security Principles

Information Security Principles

University

10 Qs

Quiz  Cybersecurity Audit

Quiz Cybersecurity Audit

University

15 Qs

Industrial Internet of Things

Industrial Internet of Things

University

16 Qs

Unauthorized Access and Modification

Unauthorized Access and Modification

University

15 Qs

PRE TEST PERTEMUAN 10 KOMPUTER DAN MASYARAKAT - CYBER CRIME

PRE TEST PERTEMUAN 10 KOMPUTER DAN MASYARAKAT - CYBER CRIME

University

10 Qs

Cybersecurity Fundamentals Week 1 Quiz

Cybersecurity Fundamentals Week 1 Quiz

KG - University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Satheesh D

Used 1+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Cyber Security?

To monitor social media activity

To create new software applications

To protect systems and data from cyber-attacks

To enhance internet speed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common type of cyber-attack?

Phishing

Software development

Data analysis

Network optimization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does encryption help to maintain?

Data speed

Data integrity

Data availability

Data privacy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a VPN used for?

To encrypt internet traffic

To store data in the cloud

To increase internet speed

To create websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for?

Communication, Integrity, Authentication

Confidentiality, Integrity, Availability

Confidentiality, Information, Access

Control, Information, Access

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a fundamental of Cyber Security?

Device Protection

Securing Online Connection

Data Analysis

Securing Email Communication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves pretending to be someone else?

Modification of messages

Masquerade

Denial of Service

Replay

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?