Search Header Logo

Cybersecurity Test

Authored by Mlandvo John Shongwe

Information Technology (IT)

Professional Development

Used 14+ times

Cybersecurity Test
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unauthorized access to control over computer network security systems


Security

Hacking

Surfing


Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a strong password?

Your name or birthday

123456b

The word “PasSsword”


A long, complex mix of letters, numbers, and symbols

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is a hacktivist


A hacktivist is a hacker who uses their skills for political activism.

A hacktivist is a type of computer virus

A hacktivist is someone who hacks for personal gain.

A hacktivist is a government employee who monitors online activity.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens in a Man-in-the-Middle (MITM) attack?

Someone sends you spam emails

Someone guesses your password

Someone deletes your files


Someone interrupts and listens to your conversation without you knowing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the primary purpose and behavior of spyware?

Spyware blocks access to websites to enforce parental controls.

Spyware secretly collects information about your activities without your consent and sends it to a third party


Spyware encrypts your files and demands payment to restore access.

Spyware scans your computer for viruses and removes them automatically.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a "gray hat" hacker?

A gray hat hacker only tests systems with explicit permission.
A gray hat hacker is always a malicious hacker.
A gray hat hacker is a hacker who may exploit a system without permission but does not have malicious intent.
A gray hat hacker only works for government agencies.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt


Fraudulent emails or messages that trick users into revealing sensitive data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?