Cybersecurity and ICT Quiz

Cybersecurity and ICT Quiz

University

40 Qs

quiz-placeholder

Similar activities

Integrated Application Software Prefinals

Integrated Application Software Prefinals

12th Grade - University

41 Qs

Chapter 2.2.2 RFID Technology

Chapter 2.2.2 RFID Technology

7th Grade - University

35 Qs

Long Quiz # 2 System Administration Activities

Long Quiz # 2 System Administration Activities

University

40 Qs

hihi

hihi

University

39 Qs

Quiz-Applied OS

Quiz-Applied OS

University

40 Qs

QUIZ REVIEW UTS PTIK

QUIZ REVIEW UTS PTIK

University

40 Qs

BIOS Settings Quiz

BIOS Settings Quiz

11th Grade - University

45 Qs

UAS Pengantar Teknologi Informasi

UAS Pengantar Teknologi Informasi

University

41 Qs

Cybersecurity and ICT Quiz

Cybersecurity and ICT Quiz

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Joel Urbiso

Used 12+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer virus?

A type of hardware issue

A self-replicating program that infects other programs

A tool for enhancing security

A programming language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of hacker?

Black Hat

White Hat

Red Hat

Grey Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does antivirus software do?

Creates computer viruses

Protects against malware

Deletes all files

Slows down computers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of the Data Privacy Act of 2012?

Limit internet usage

Ensure data protection and privacy

Promote hacking

Prevent software updates

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of malware?

Microsoft Word

Trojan Horse

Google Chrome

Wi-Fi Router

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that spreads across networks by exploiting vulnerabilities, without needing a host file.

A type of malware that replicates itself

A hacking method to gain unauthorized access to networks

A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity

A way to encrypt data for security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an example of a cyber threat?

Ransomware

Firewall

Spyware

Keyloggers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?