Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

quiz-placeholder

Similar activities

CSF Week 2

CSF Week 2

University

10 Qs

Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

University

10 Qs

Cyber Security

Cyber Security

12th Grade - Professional Development

8 Qs

Tech Tarik 2.0 : Phishing Awareness Quiz by CYBERHAX

Tech Tarik 2.0 : Phishing Awareness Quiz by CYBERHAX

University

13 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Instructional Technology, Computers

University

Medium

Created by

Noor Haidah

Used 16+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of attack is designed to hinder the normal operation of a website, or other network resource.

DoS attack

Phishing

Browser hijacker

Zero-Day Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes spam?

Collect information about a person or organisation without their knowledge

Performing an unauthorised, usually malicious, action such as erasing files

Putting unnecessary load on the network by making copies of files

Sending unwanted bulk messages.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following can protect a computer from the risk of unwanted emails?

Anti-spam software.

Anti-virus software.

Anti-spyware software.

PC diagnostic software.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following could lead to the spread of a malicious program?

Using only software that has been checked for viruses.

Maintaining regularly updated anti-virus software.

Opening only virus-checked file attachments from known sources.

Using a USB Flash Drive from an unknown source to exchange data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes why firewalls are used?

To prevent unauthorised access by incoming transmissions.

To prevent destruction of a computer in the event of a fire.

To enable easy downloading of data from web sites.

To detect and disable viruses already on a computer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following shows respect for the confidentiality of information?

Discussing confidential information over the telephone.

Disclosing confidential information only to authorised individuals.

Uploading confidential information to a shared web site.

Emailing confidential information to a colleague.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is an example of phishing?

An email warning the recipient of a computer virus threat

An email directing the recipient to forward the email to friends

An email directing the receiver to enter personal details on a fake website

An email directing the recipient to download an attachment

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?