Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

30 Qs

quiz-placeholder

Similar activities

Microsoft Word Chapter 1

Microsoft Word Chapter 1

9th - 12th Grade

25 Qs

1st 9 Weeks Exam Study Guide

1st 9 Weeks Exam Study Guide

9th - 12th Grade

27 Qs

Nguyên lí an toàn thông tin

Nguyên lí an toàn thông tin

11th - 12th Grade

25 Qs

Practice Review Domain 3 -Medical Law and Ethics

Practice Review Domain 3 -Medical Law and Ethics

12th Grade

30 Qs

CIW 10

CIW 10

7th Grade - Professional Development

26 Qs

P2_INT_Chapter 6 - Test

P2_INT_Chapter 6 - Test

9th - 12th Grade

25 Qs

LO1

LO1

11th - 12th Grade

34 Qs

Section A 24

Section A 24

12th Grade

30 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Instructional Technology

12th Grade

Medium

Created by

Keegan Yap

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability in a system?

A feature that enhances security

A weakness in the system

A strong defense mechanism

A type of software update

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day attack?

An attack that targets previously known vulnerabilities

An attack that exploits a vulnerability that has never been reported

An attack that occurs after vulnerabilities are patched

An attack that happens within the first day of software release

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which database is mentioned as a source for vulnerabilities?

ISO

NVD

CVE

SQL

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "threat agent" refer to?

A person exploiting a vulnerability

A type of software

A security measure

An organization that creates vulnerabilities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of role-based access control (RBAC)?

To limit access based on job roles

To provide unlimited access to all users

To create a single point of access for all data

To ensure all users have administrative rights

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Insider threats are primarily caused by:

Software bugs

Employees within the organization

External hackers

Natural disasters

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of least privilege?

Users should have maximum access

All users should have administrative privileges

Users should have access only to necessary data

Access should be granted based on seniority

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?