Cybersecurity Quiz

Cybersecurity Quiz

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Mājoklis 8.klase

Mājoklis 8.klase

8th Grade

15 Qs

SS Syllabus Quiz

SS Syllabus Quiz

8th Grade

10 Qs

Sefer Yehoshua - Perek Aleph

Sefer Yehoshua - Perek Aleph

4th - 8th Grade

14 Qs

Test Taking Strategies

Test Taking Strategies

6th - 8th Grade

10 Qs

Carpentry Tools

Carpentry Tools

8th Grade

10 Qs

American Free Enterprise Pre-Test

American Free Enterprise Pre-Test

6th - 8th Grade

10 Qs

CEEC QUIZ 92 (Vocabulary)

CEEC QUIZ 92 (Vocabulary)

7th Grade

10 Qs

Leaders of The World

Leaders of The World

KG - University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Other

6th - 8th Grade

Practice Problem

Easy

Created by

Alexander Woolston

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a social engineering technique used to obtain information?

Pharming

Shouldering

Malware

Outdated software

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of phishing?

To forward users to a bogus website

To persuade someone to enter confidential data

To look over someone's shoulder to gain information

To get a victim to divulge information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware?

Pharming

Blagging

Trojan

Shouldering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "blagging" involve?

Sending fraudulent emails

Forwarding users to a fake website

Creating a scenario to trick a victim into giving away information

Observing someone entering their password

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as a threat in the slides?

Weak passwords

Misconfigured access

Hardware failure

Removable media

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of a virus?

It does not self-replicate

It monitors user activity without their knowledge

It requires a host program to spread

It self-replicates and infects other files

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "shouldering"?

Sending emails claiming to be someone else

Forwarding users to a bogus website

Looking over someone's shoulder to get private data

Using removable media to spread malware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?