Quiz on Computer Security and Cybersecurity

Quiz on Computer Security and Cybersecurity

9th Grade

19 Qs

quiz-placeholder

Similar activities

Viruses and Malware

Viruses and Malware

7th - 9th Grade

20 Qs

MALWARE

MALWARE

9th Grade

20 Qs

APCSP IOC-2.C Cybersecurity Threats

APCSP IOC-2.C Cybersecurity Threats

9th - 12th Grade

15 Qs

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

Virus, Worms and Trojan Horses

Virus, Worms and Trojan Horses

7th - 9th Grade

15 Qs

036_Supply Chain Vulnerabilities – CompTIA Security+

036_Supply Chain Vulnerabilities – CompTIA Security+

9th - 12th Grade

20 Qs

Computer Software Quiz

Computer Software Quiz

9th Grade

15 Qs

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

8th Grade - University

14 Qs

Quiz on Computer Security and Cybersecurity

Quiz on Computer Security and Cybersecurity

Assessment

Quiz

Computers

9th Grade

Medium

Created by

K John

Used 1+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of computer security?

Enhancing user experience

Improving internet speed

Protecting data and networks

Protecting physical hardware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common form of malware?

Backup

Encryption

Ransomware

Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware do?

Deletes files permanently

Prevents access until a ransom is paid

Steals personal information

Spreads to other devices without permission

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan virus?

A type of antivirus software

A network security protocol

Malware disguised as legitimate software

A method of data encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack?

An attack that overloads servers with traffic

A method to encrypt data

A type of malware

A security software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does phishing rely on?

Malware installation

Network security flaws

Social engineering

Technical vulnerabilities

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the CIA Triad in information security?

Control, Information, Access

Confidentiality, Identity, Authentication

Control, Integrity, Access

Confidentiality, Integrity, Availability

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?