This type of attack is designed to hinder the normal operation of a website, or other network resource.
Cyber Security Quiz

Quiz
•
Instructional Technology, Computers
•
University
•
Medium

Noor Haidah
Used 16+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DoS attack
Phishing
Browser hijacker
Zero-Day Attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes spam?
Collect information about a person or organisation without their knowledge
Performing an unauthorised, usually malicious, action such as erasing files
Putting unnecessary load on the network by making copies of files
Sending unwanted bulk messages.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following can protect a computer from the risk of unwanted emails?
Anti-spam software.
Anti-virus software.
Anti-spyware software.
PC diagnostic software.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following could lead to the spread of a malicious program?
Using only software that has been checked for viruses.
Maintaining regularly updated anti-virus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes why firewalls are used?
To prevent unauthorised access by incoming transmissions.
To prevent destruction of a computer in the event of a fire.
To enable easy downloading of data from web sites.
To detect and disable viruses already on a computer.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following shows respect for the confidentiality of information?
Discussing confidential information over the telephone.
Disclosing confidential information only to authorised individuals.
Uploading confidential information to a shared web site.
Emailing confidential information to a colleague.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is an example of phishing?
An email warning the recipient of a computer virus threat
An email directing the recipient to forward the email to friends
An email directing the receiver to enter personal details on a fake website
An email directing the recipient to download an attachment
Create a free account and access millions of resources
Similar Resources on Quizizz
13 questions
Grade 6 - Checkpoint1- Revision

Quiz
•
6th Grade - University
15 questions
Midterm Quiz

Quiz
•
University
10 questions
SOFTWARE ENGINEERING

Quiz
•
University
15 questions
Computer Networking Quiz

Quiz
•
11th Grade - University
15 questions
Management Information System (MIS)

Quiz
•
University
10 questions
Cybersecurity Threats Quiz

Quiz
•
University
13 questions
Tech Tarik 2.0 : Phishing Awareness Quiz by CYBERHAX

Quiz
•
University
12 questions
Data Breach Quiz

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade