Cybersecurity Quiz

Cybersecurity Quiz

9th - 12th Grade

58 Qs

quiz-placeholder

Similar activities

Celebrity Showdown

Celebrity Showdown

7th - 12th Grade

56 Qs

THIS OR THAT?

THIS OR THAT?

KG - Professional Development

53 Qs

KUIZ CATUR

KUIZ CATUR

10th - 12th Grade

60 Qs

Disney

Disney

6th - 9th Grade

55 Qs

J09.5 格式化储存格

J09.5 格式化储存格

1st Grade - University

57 Qs

Rutherford's & Bohr's Experiment

Rutherford's & Bohr's Experiment

7th - 9th Grade

55 Qs

General knowledges

General knowledges

7th - 12th Grade

54 Qs

Ultimate Cricket Quiz

Ultimate Cricket Quiz

KG - Professional Development

53 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Fun

9th - 12th Grade

Practice Problem

Easy

Created by

Juwayriyah Hoosen

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of vishing?

Fake website that collects your login details

Fraudulent SMS messages

A scammer calling you pretending to be your bank to get your PIN

Pop-up ads appearing on your browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The main goal of ransomware is to:

Gain free access to paid software

Steal data for resale

Force victims to pay money to regain access to files

Show advertisements online

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of phishing?

Unexpected emails with urgent requests for login details

A licensed software update from Microsoft

Messages from family members

Verified banking app notifications

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A worm can spread rapidly because it:

Disguises itself as legitimate software

Does not need to attach to files or programs to replicate

Requires human error to open an attachment

Can only spread through USB devices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a consequence of software piracy?

Supporting software developers financially

Higher risk of malware infection

Receiving regular updates and security patches

Stronger data protection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a keylogger record?

Screen activity

Internet traffic

Mouse clicks

Keyboard strokes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker is considered ethical?

Black hat hacker

Grey hat hacker

White hat hacker

Crackers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?