
Cyber Security
Authored by Sireesha Rodda
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is a type of malicious software that locks data and demands payment for its release?
spyware
ransomware
phishing
firewall
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the purpose of a firewall in cyber security?
to clean viruses from a computer
to block unauthorised access to network
to store passwords securely
to monitor physical security
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of these is an example of a phishing attack?
A hacker physically stealing a computer
A fake email pretending to be from a bank asking for login details
A program that speeds up computer performance
A tool that helps in software development
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is the best practice for creating a strong password?
Using "password123" for all accounts
A combination of uppercase, lowercase, numbers, and symbols
Writing the password on a sticky note
Using the same password for all accounts
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is Multi-Factor Authentication (MFA)?
A process of sending multiple emails at once
A security method that requires multiple forms of verification (e.g., password + OTP)
A technique for encrypting emails
A type of cyber attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?