CyberQuest

CyberQuest

University

15 Qs

quiz-placeholder

Similar activities

Posttest Keamanan Digital

Posttest Keamanan Digital

University

11 Qs

Internet Safety

Internet Safety

8th Grade - University

10 Qs

Safe Gaming: Know the Risks

Safe Gaming: Know the Risks

7th Grade - University

12 Qs

Digital Footprint

Digital Footprint

5th Grade - University

11 Qs

Digital Citizenship Test

Digital Citizenship Test

7th Grade - University

20 Qs

Digital Marketing and SEO Quiz

Digital Marketing and SEO Quiz

University

10 Qs

Ethical Hacking week #1

Ethical Hacking week #1

University

10 Qs

Uji Pemahaman Sistem Keamanan Jaringan

Uji Pemahaman Sistem Keamanan Jaringan

12th Grade - University

15 Qs

CyberQuest

CyberQuest

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

605_Vighnesh Wadekar

Used 7+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MCQ:

The purpose of a Firewall is to?

Heat the CPU

Block physical damage to the device

Control incoming and outgoing network traffic

Improve Wi-Fi speed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MCQ:

Which one of the following helps protect your Email account?

Using simple passwords like "1234"

Logging out after use

Sharing your passwords with friends

Using the same password everywhere

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MCQ:

Which type of Cyberattack floods a system with traffic, making it unavailable?

SQL Injection

DDoS Attack

Phishing

Keylogging

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MCQ:

Which of the following is the strongest password?

12345678

qwertyui

P@55w0rd!2025

password123

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MCQ:

Which one of the following is NOT a type of malware?

Ransomware

Adware

Firewall

Trojan House

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:

Antivirus software alone guarentees complete cybersecurity.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False:

Social Engineering attacks exploit human psychology rather than technical flaws.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)