Cybersecurity Quiz

Cybersecurity Quiz

9th - 12th Grade

58 Qs

quiz-placeholder

Similar activities

Kocak

Kocak

9th Grade

53 Qs

Soal PuPk dan Sandi Pramuka

Soal PuPk dan Sandi Pramuka

4th - 9th Grade

55 Qs

Final Quiz

Final Quiz

10th Grade

55 Qs

Mr. Habscheid's Quiz

Mr. Habscheid's Quiz

1st - 12th Grade

59 Qs

Riddle Fun

Riddle Fun

6th Grade - University

60 Qs

Autos

Autos

7th - 11th Grade

57 Qs

Yu-Gi-Oh ultimate you have been warned

Yu-Gi-Oh ultimate you have been warned

KG - Professional Development

61 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Fun

9th - 12th Grade

Practice Problem

Easy

Created by

Juwayriyah Hoosen

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of vishing?

Fake website that collects your login details

Fraudulent SMS messages

A scammer calling you pretending to be your bank to get your PIN

Pop-up ads appearing on your browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The main goal of ransomware is to:

Gain free access to paid software

Steal data for resale

Force victims to pay money to regain access to files

Show advertisements online

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of phishing?

Unexpected emails with urgent requests for login details

A licensed software update from Microsoft

Messages from family members

Verified banking app notifications

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A worm can spread rapidly because it:

Disguises itself as legitimate software

Does not need to attach to files or programs to replicate

Requires human error to open an attachment

Can only spread through USB devices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a consequence of software piracy?

Supporting software developers financially

Higher risk of malware infection

Receiving regular updates and security patches

Stronger data protection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a keylogger record?

Screen activity

Internet traffic

Mouse clicks

Keyboard strokes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker is considered ethical?

Black hat hacker

Grey hat hacker

White hat hacker

Crackers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?