Cyber Security Quiz

Cyber Security Quiz

9th Grade

11 Qs

quiz-placeholder

Similar activities

Comp 3 Aim A Modern technologies

Comp 3 Aim A Modern technologies

9th Grade

10 Qs

Cybersecurity Countermeasures Quiz

Cybersecurity Countermeasures Quiz

9th Grade

14 Qs

Vendor Security Quiz

Vendor Security Quiz

9th - 12th Grade

10 Qs

Lesson 1: Online Services

Lesson 1: Online Services

9th - 12th Grade

15 Qs

Safe Gaming: Know the Risks

Safe Gaming: Know the Risks

7th Grade - University

12 Qs

Cyber Security Awreness

Cyber Security Awreness

9th - 12th Grade

15 Qs

CySA Module 6 - Software and Hardware Assurance Best Practices

CySA Module 6 - Software and Hardware Assurance Best Practices

9th Grade

15 Qs

SSC Summer Camp Post-Quiz

SSC Summer Camp Post-Quiz

9th - 12th Grade

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Information Technology (IT)

9th Grade

Medium

Created by

Cory Zoblin

Used 4+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Plankton is trying to hack into the Krusty Krab's database to steal the secret formula. However, the Krusty Krab has already protected itself through a process called _______________________________
VPN Protocols
Network Hardening
Security Analyzer Tools
Data Fragmentation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Quandale Dingle, a regular employee, clicked on a malicious link through a fake email. What is this type of attack called?
Whaling
Phishing
Man in the Middle Attack
Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
A chill guy with his hands in his pockets can't get on the internet, so he takes his hands out of his pockets and is as a result, less chill. Then, he unplugs his router, and his ____________, or the device that connects to the Internet Service Provider, hoping to become chill again.
Modem
Hub
Wi Fi Extender
Ethernet Cable

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
John Pork receives a security text message from Gmail as he tries to log into his account. What is this called?
Logging Out
Smart Code
Security Hardening
Multi-Factor Authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Which of these tools would Timmy Turner most likely use to block Vicki from accessing his network?
Waterwall
Brickwall
Firewall
Anti-Virus Software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Kai Cenat wants to stream but only has access to a public wi-fi network. Which of the following is true about public Wi-Fi networks?

They are always secure

They should be used to conduct financial transactions

They may be less secure, so sensitive activities should be avoided

They are safer than your home network

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Mickey Mouse has just started an online Disney store. What security measures should Mickey Mouse implement to ensure his online store is secure and his customers' data is protected? (Select All That Apply)

Encryption

Multi Factor Authentication

Regular Software Updates

Intrusion Detection Systems

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?