Cyber security

Cyber security

University

10 Qs

quiz-placeholder

Similar activities

Roblox Quiz

Roblox Quiz

KG - Professional Development

10 Qs

WISE, WORTH, WIDE WEBINAR

WISE, WORTH, WIDE WEBINAR

University

15 Qs

Madras Vista - Round 1

Madras Vista - Round 1

University

15 Qs

Trivia Tourney 4/8/22

Trivia Tourney 4/8/22

University

10 Qs

Relative Pronuon - Grammar - L2

Relative Pronuon - Grammar - L2

University

10 Qs

yoga 6

yoga 6

University

10 Qs

Christmas (GOA)

Christmas (GOA)

University

12 Qs

Bible Quiz - Level 1 - Elementary

Bible Quiz - Level 1 - Elementary

KG - Professional Development

14 Qs

Cyber security

Cyber security

Assessment

Quiz

Fun

University

Practice Problem

Hard

Created by

Romelyn Menguin

Used 414+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Anti-virus

Firewall

Encryption

Malware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An individual who uses scripts or software written by someone else to exploit or break into a computer system.

Cracker

Ethical Hacker

Script Kiddie

Man in the middle

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following passwords meet password requirements?

p455w0rd1

!@#$%^&*

akHGksmLN

uP1b@!Si7p

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?

Turn your computer off

Disconnect your computer from the network

Unplug your mouse

Run anti-virus

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Cyber criminal

Phishing

Attack password

Online predator

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access

Cyber Security

White Hat Hacker

Domain Name Server

All of the above

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What are the motives behind cyber crime?

Demanding ransom

Propagating religious or political beliefs

Financial loss to the target

Information thefts and manipulating data

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?