Cyber Security Vocabulary Review

Cyber Security Vocabulary Review

Professional Development

6 Qs

quiz-placeholder

Similar activities

Exercise: Information and Computer Security

Exercise: Information and Computer Security

Professional Development

8 Qs

Review- Day 4

Review- Day 4

KG - Professional Development

10 Qs

INFOSEC WEEK DAY 3

INFOSEC WEEK DAY 3

Professional Development

10 Qs

Cyber Fraud Training

Cyber Fraud Training

Professional Development

10 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

ICT Skills

ICT Skills

Professional Development

10 Qs

Cyber Security Awareness Month

Cyber Security Awareness Month

Professional Development

5 Qs

INFOSEC WEEK DAY 2

INFOSEC WEEK DAY 2

Professional Development

10 Qs

Cyber Security Vocabulary Review

Cyber Security Vocabulary Review

Assessment

Quiz

Other

Professional Development

Medium

Created by

Stephanie Smith

Used 17+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.

a process that encodes a message or data so that it can only be read by certain people. This helps protect the information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber Security can be defined as

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

All of the above

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

a login method that only grants the user access after they have showed multiple credentials to verify their identity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multi-factor Authentication (MFA or 2FA)

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

a login method that only grants the user access after they have showed multiple credentials to verify their identity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineering is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.

a process that encodes a message or data so that it can only be read by certain people. This helps protect the information.