Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

quiz-placeholder

Similar activities

1. Intro to CC and  AWS

1. Intro to CC and AWS

University

15 Qs

Intro to Education Quiz

Intro to Education Quiz

2nd Grade - University

10 Qs

EC8552_CA0_MODEL EXAM I_PART B_16.10.2020

EC8552_CA0_MODEL EXAM I_PART B_16.10.2020

University

10 Qs

mock IA IOT

mock IA IOT

University

10 Qs

Chapter 8 Study Guide!

Chapter 8 Study Guide!

KG - University

14 Qs

Virtualization and Cloud Computing

Virtualization and Cloud Computing

12th Grade - University

11 Qs

WLAN P1

WLAN P1

University

12 Qs

MIS Chapter 6

MIS Chapter 6

University

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Other

University

Medium

Created by

Zion Lee

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the HTTPS at the beginning of a URL denote, as opposed to HTTP (without the S)?

That the site has special high definition

That information entered into the site is encrypted

That the site is the newest version available

That the site is not accessible to certain computers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a "phishing" attack?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows

Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of computers that is networked together and used by hackers to steal information is called a …

Botnet

Rootkit

DDoS

Operating system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following four passwords is the most secure?

Boat123

WTh!5Z

into*48

123456

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …

Botnet

Ransomware

Driving

Spam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Private browsing" is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?

Yes

No

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Turning off the GPS function of your smartphone prevents any tracking of your phone's location.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?