Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

quiz-placeholder

Similar activities

techveorp_ict

techveorp_ict

University

15 Qs

IT Infrastructure and Emerging Technologies

IT Infrastructure and Emerging Technologies

University

10 Qs

Certified Ethical Hacker 1

Certified Ethical Hacker 1

University

10 Qs

Comp TIA IF Fundamentals Practice Questions

Comp TIA IF Fundamentals Practice Questions

9th Grade - Professional Development

10 Qs

Understanding HIPAA and Dental Ergonomics

Understanding HIPAA and Dental Ergonomics

University

10 Qs

MIS Prelim Quiz

MIS Prelim Quiz

University

15 Qs

Quiz #1 - Computing Disciplines

Quiz #1 - Computing Disciplines

University

15 Qs

computer software

computer software

University

13 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Other

University

Easy

Created by

Junice Ilagan

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scenario best illustrates an insider threat?

A hacker using a brute-force tool to guess a password

An employee accidentally sending sensitive files to the wrong email address

Malware entering through a compromised website

An attacker flooding a server with traffic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is outdated software considered a security vulnerability?

It often runs slower, leading to user frustration

It lacks the latest features and aesthetics

It may contain unpatched security flaws that hackers can exploit

It consumes more computer memory

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best aligns with the 'Integrity' aspect of the CIA Triad?

Preventing unauthorized access to data

Ensuring data is accurate and unaltered

Making sure systems are always connected to the internet

Encrypting files for confidential transfer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a common trait of phishing attacks?

Links to legitimate government websites

Requests for sensitive personal information

Messages creating urgency or fear

Emails disguised to look trustworthy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most likely consequence of using '12345' as a password?

A software error

The system will crash

Increased risk of unauthorized access

Loss of internet connection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protection strategy provides an extra layer of security after entering a password?

Antivirus installation

Two-Factor Authentication (2FA)

Data encryption

Regular software updates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a distinguishing characteristic of a DDoS attack?

One computer infecting another with malware

Continuous attempts to steal a user's password

Overwhelming a system with traffic to cause downtime

Sending fake emails to trick users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?