Cyber Security Quiz

Cyber Security Quiz

10th Grade

20 Qs

quiz-placeholder

Similar activities

Python Year 9 Quiz

Python Year 9 Quiz

8th - 10th Grade

19 Qs

Trắc nghiệm excel - 1

Trắc nghiệm excel - 1

KG - University

20 Qs

Chapter 3: Storage devices and media (Part 2):

Chapter 3: Storage devices and media (Part 2):

10th - 11th Grade

15 Qs

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

10th - 12th Grade

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Informatika Kelas 5 Bab 2

Informatika Kelas 5 Bab 2

5th Grade - University

19 Qs

Quiz on Misinformation and Bias

Quiz on Misinformation and Bias

10th Grade - University

18 Qs

Начала программирования на языке Паскаль

Начала программирования на языке Паскаль

8th - 11th Grade

15 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Which of the following is an example of social engineering?

Malware

Encryption

Firewall

Phishing

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

What is social engineering?

A method used by attackers to manipulate individuals into revealing sensitive information or performing actions that may compromise security.

A technique used by hackers to physically break into buildings and steal information.

A type of marketing strategy used to promote products on social media platforms.

A form of psychological manipulation used by therapists to help individuals overcome social anxiety.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

What is a phishing attack?

A type of virus that infects computers

A type of fishing that involves catching phish

A type of social media platform

A fraudulent message sent to trick the recipient into revealing sensitive information or clicking on a malicious link.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Is a person who breaks into computers, usually by gaining access to administrative controls.

Hacker

User

Gamer

Developer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Which type of software is designed to damage or disrupt systems?

Antivirus

Malware

Operating System

Database Management System

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Olivia downloaded a program that attached itself to a host file on her computer and started replicating itself. What is this program called?

Virus

Worm

Trojan

Backdoor

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

An unethical hacker

White hat

Black hat

Grey hat

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?