Cyber Security Quiz

Quiz
•
Instructional Technology, Computers
•
University
•
Medium

Noor Haidah
Used 25+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This type of attack is designed to hinder the normal operation of a website, or other network resource.
DoS attack
Phishing
Browser hijacker
Zero-Day Attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes spam?
Collect information about a person or organisation without their knowledge
Performing an unauthorised, usually malicious, action such as erasing files
Putting unnecessary load on the network by making copies of files
Sending unwanted bulk messages.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following can protect a computer from the risk of unwanted emails?
Anti-spam software.
Anti-virus software.
Anti-spyware software.
PC diagnostic software.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following could lead to the spread of a malicious program?
Using only software that has been checked for viruses.
Maintaining regularly updated anti-virus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes why firewalls are used?
To prevent unauthorised access by incoming transmissions.
To prevent destruction of a computer in the event of a fire.
To enable easy downloading of data from web sites.
To detect and disable viruses already on a computer.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following shows respect for the confidentiality of information?
Discussing confidential information over the telephone.
Disclosing confidential information only to authorised individuals.
Uploading confidential information to a shared web site.
Emailing confidential information to a colleague.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is an example of phishing?
An email warning the recipient of a computer virus threat
An email directing the recipient to forward the email to friends
An email directing the receiver to enter personal details on a fake website
An email directing the recipient to download an attachment
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
UIT 2221 ICT SFETY AND SECURITY (COPTPA)

Quiz
•
University
15 questions
Software Engineering

Quiz
•
University
15 questions
UIT 2221 MALWARE (COPTPA)

Quiz
•
University
15 questions
2024 Applause Tester NDA Quiz

Quiz
•
12th Grade - University
10 questions
Introduction to Computer Science

Quiz
•
University
10 questions
software

Quiz
•
University
10 questions
Topic 1 - Type of Software

Quiz
•
University
10 questions
CSF Week 2

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Instructional Technology
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University