Search Header Logo

Cyber Security Quiz

Authored by Cory Zoblin

Information Technology (IT)

9th Grade

Used 9+ times

Cyber Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Plankton is trying to hack into the Krusty Krab's database to steal the secret formula. However, the Krusty Krab has already protected itself through a process called _______________________________

VPN Protocols
Network Hardening
Security Analyzer Tools
Data Fragmentation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Quandale Dingle, a regular employee, clicked on a malicious link through a fake email. What is this type of attack called?

Whaling
Phishing
Man in the Middle Attack
Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A chill guy with his hands in his pockets can't get on the internet, so he takes his hands out of his pockets and is as a result, less chill. Then, he unplugs his router, and his ____________, or the device that connects to the Internet Service Provider, hoping to become chill again.

Modem
Hub
Wi Fi Extender
Ethernet Cable

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

John Pork receives a security text message from Gmail as he tries to log into his account. What is this called?

Logging Out
Smart Code
Security Hardening
Multi-Factor Authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of these tools would Timmy Turner most likely use to block Vicki from accessing his network?

Waterwall
Brickwall
Firewall
Anti-Virus Software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Kai Cenat wants to stream but only has access to a public wi-fi network. Which of the following is true about public Wi-Fi networks?

They are always secure

They should be used to conduct financial transactions

They may be less secure, so sensitive activities should be avoided

They are safer than your home network

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Mickey Mouse has just started an online Disney store. What security measures should Mickey Mouse implement to ensure his online store is secure and his customers' data is protected? (Select All That Apply)

Encryption

Multi Factor Authentication

Regular Software Updates

Intrusion Detection Systems

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?