Cyber Security

Cyber Security

Professional Development

5 Qs

quiz-placeholder

Similar activities

Data Ethics and Security

Data Ethics and Security

Professional Development

8 Qs

Talkshow LAPAN CSIRT

Talkshow LAPAN CSIRT

Professional Development

10 Qs

NE Pilot

NE Pilot

Professional Development

9 Qs

Mini Quiz

Mini Quiz

Professional Development

7 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Monday Briefing Cybersecurity

Monday Briefing Cybersecurity

Professional Development

10 Qs

Security Awareness Training

Security Awareness Training

Professional Development

10 Qs

System Ethical Hacking

System Ethical Hacking

Professional Development

10 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Sireesha Rodda

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a type of malicious software that locks data and demands payment for its release?
spyware
ransomware
phishing
firewall

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the purpose of a firewall in cyber security?
to clean viruses from a computer
to block unauthorised access to network
to store passwords securely
to monitor physical security

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of these is an example of a phishing attack?
A hacker physically stealing a computer
A fake email pretending to be from a bank asking for login details
A program that speeds up computer performance
A tool that helps in software development

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is the best practice for creating a strong password?
Using "password123" for all accounts
A combination of uppercase, lowercase, numbers, and symbols
Writing the password on a sticky note
Using the same password for all accounts

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is Multi-Factor Authentication (MFA)?
A process of sending multiple emails at once
A security method that requires multiple forms of verification (e.g., password + OTP)
A technique for encrypting emails
A type of cyber attack