Search Header Logo

Cybersecurity Quiz

Authored by Junice Ilagan

Other

University

Used 4+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scenario best illustrates an insider threat?

A hacker using a brute-force tool to guess a password

An employee accidentally sending sensitive files to the wrong email address

Malware entering through a compromised website

An attacker flooding a server with traffic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is outdated software considered a security vulnerability?

It often runs slower, leading to user frustration

It lacks the latest features and aesthetics

It may contain unpatched security flaws that hackers can exploit

It consumes more computer memory

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best aligns with the 'Integrity' aspect of the CIA Triad?

Preventing unauthorized access to data

Ensuring data is accurate and unaltered

Making sure systems are always connected to the internet

Encrypting files for confidential transfer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a common trait of phishing attacks?

Links to legitimate government websites

Requests for sensitive personal information

Messages creating urgency or fear

Emails disguised to look trustworthy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most likely consequence of using '12345' as a password?

A software error

The system will crash

Increased risk of unauthorized access

Loss of internet connection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protection strategy provides an extra layer of security after entering a password?

Antivirus installation

Two-Factor Authentication (2FA)

Data encryption

Regular software updates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a distinguishing characteristic of a DDoS attack?

One computer infecting another with malware

Continuous attempts to steal a user's password

Overwhelming a system with traffic to cause downtime

Sending fake emails to trick users

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?