Cyber Security Quiz

Cyber Security Quiz

9th Grade

11 Qs

quiz-placeholder

Similar activities

Scratch Jr Blocks

Scratch Jr Blocks

2nd Grade - University

12 Qs

Data Science Introduction -IX

Data Science Introduction -IX

9th Grade

10 Qs

Computer basics

Computer basics

7th Grade - University

15 Qs

IT/CS Review Quizzizz

IT/CS Review Quizzizz

6th Grade - University

15 Qs

IST-Unit 1: Tech&BusinessComputingEthics&Safety&CTSO

IST-Unit 1: Tech&BusinessComputingEthics&Safety&CTSO

9th - 12th Grade

12 Qs

G4-Microprocessors and Their Uses

G4-Microprocessors and Their Uses

4th Grade - University

15 Qs

Conditional Control Statements

Conditional Control Statements

8th Grade - University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Information Technology (IT)

9th Grade

Practice Problem

Medium

Created by

Cory Zoblin

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Plankton is trying to hack into the Krusty Krab's database to steal the secret formula. However, the Krusty Krab has already protected itself through a process called _______________________________

VPN Protocols
Network Hardening
Security Analyzer Tools
Data Fragmentation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Quandale Dingle, a regular employee, clicked on a malicious link through a fake email. What is this type of attack called?

Whaling
Phishing
Man in the Middle Attack
Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A chill guy with his hands in his pockets can't get on the internet, so he takes his hands out of his pockets and is as a result, less chill. Then, he unplugs his router, and his ____________, or the device that connects to the Internet Service Provider, hoping to become chill again.

Modem
Hub
Wi Fi Extender
Ethernet Cable

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

John Pork receives a security text message from Gmail as he tries to log into his account. What is this called?

Logging Out
Smart Code
Security Hardening
Multi-Factor Authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of these tools would Timmy Turner most likely use to block Vicki from accessing his network?

Waterwall
Brickwall
Firewall
Anti-Virus Software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Kai Cenat wants to stream but only has access to a public wi-fi network. Which of the following is true about public Wi-Fi networks?

They are always secure

They should be used to conduct financial transactions

They may be less secure, so sensitive activities should be avoided

They are safer than your home network

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Mickey Mouse has just started an online Disney store. What security measures should Mickey Mouse implement to ensure his online store is secure and his customers' data is protected? (Select All That Apply)

Encryption

Multi Factor Authentication

Regular Software Updates

Intrusion Detection Systems

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?