Cybersecurity Quiz

Cybersecurity Quiz

University

8 Qs

quiz-placeholder

Similar activities

Protecting Personal Data and Cyber Hygiene Practices

Protecting Personal Data and Cyber Hygiene Practices

University

6 Qs

WEBSITE

WEBSITE

University

8 Qs

Quiz về tìm kiếm thông tin trên WWW

Quiz về tìm kiếm thông tin trên WWW

6th Grade - University

10 Qs

KUIS DENGAN TOPIK MATERI PERTEMUAN 1

KUIS DENGAN TOPIK MATERI PERTEMUAN 1

10th Grade - University

10 Qs

Tinklalapių kūrimo sąvokos

Tinklalapių kūrimo sąvokos

10th Grade - University

12 Qs

Week 8 Quiz 2 Cyber Threats

Week 8 Quiz 2 Cyber Threats

University

10 Qs

Cryptography Quiz

Cryptography Quiz

University

10 Qs

Arquitectura y protocolos de red

Arquitectura y protocolos de red

9th Grade - University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Honey yummy in my tummy <3

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan in cybersecurity?

A password manager for secure storage

A security tool designed to detect threats

A program that spreads by copying itself to other devices

A type of malware disguised as legitimate software

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a Trojan typically infect a system?

By tricking users into downloading and installing it

By corrupting antivirus software

By locking files and demanding payment

By automatically spreading through a network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Wi-Fi is completely safe for online banking if the website uses HTTPS (Hypertext Transfer Protocol Secure).

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about HTTPS is TRUE?

HTTPS ensures the website itself is trustworthy.

HTTPS encrypts the data transferred between your browser and the website.

HTTPS guarantees that the website is free from malware.

HTTPS automatically blocks all phishing attempts.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a "Man-in-the-Middle" attack?

A type of cyber attack that duplicates a secure website to steal login credentials

A type of cyber attack that duplicates a secure website to steal login credentials

A ransomware attack that encrypts your files until payment is made

An attack where a hacker intercepts and manipulates communication between two parties

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a firewall in network security?

To encrypt data transmitted over the network

To monitor and control incoming and outgoing network traffic

To store sensitive information securely

To provide a backup for lost data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used in phishing attacks?

Encrypting files to prevent unauthorized access

Sending unsolicited emails that appear to be from legitimate sources

Using strong passwords for all accounts

Installing antivirus software on a device

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "malware" refer to?

Software designed to protect against cyber threats

Any software intentionally designed to cause damage to a computer system

Programs that enhance system performance

Tools used for data recovery