Search Header Logo

Cybersecurity Concepts Worksheet

Authored by n b

Information Technology (IT)

University

Used 1+ times

Cybersecurity Concepts Worksheet
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of inappropriate use?

Accessing a sensitive file without authorization

Using a work computer to browse social media for hours

Crashing a server with traffic

Spreading malware via email

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an Unauthorized Access (UA) attack according to NIST?

A user accidentally deletes critical files

A hacker gains access to a system using stolen credentials

A website is overloaded with traffic

An employee forgets to log off a computer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Denial-of-Service (DoS) attack?

An attempt to access data without permission

The theft of personal credentials via email

An attack that floods a system with traffic, making it unavailable

A program that spreads itself by copying to other programs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a Trojan Horse?

A fake email asking for a password

A virus that replicates on its own

A seemingly legitimate program that has hidden malware

A worm that disables antivirus software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which option defines a virus?

A self-replicating program that does not require user interaction

A deceptive email designed to steal credentials

A malicious program attached to a host file that requires user action

A hoax message used to trick users into deleting files

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a hoax?

A fake pop-up claiming a virus is detected

A self-replicating program

A network scanning tool

An email phishing for passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common indicator of a DoS attack?

Unusual outbound email volume

Extremely slow network performance or service outages

Sudden increase in system logs

System clock changes unexpectedly

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?