BIA Cyber Security Awareness Quiz - Session 1

BIA Cyber Security Awareness Quiz - Session 1

KG - Professional Development

β€’

15 Qs

quiz-placeholder

Similar activities

Vocabulary Lesson 33

Vocabulary Lesson 33

6th Grade

β€’

20 Qs

𝐁𝐄𝐓𝐀 πˆπŽπ“π€ π€π‹ππ‡π€πŸŒΈ: Week 1

𝐁𝐄𝐓𝐀 πˆπŽπ“π€ π€π‹ππ‡π€πŸŒΈ: Week 1

University

β€’

15 Qs

Software Documentation

Software Documentation

11th - 12th Grade

β€’

20 Qs

Computer Software

Computer Software

6th Grade

β€’

20 Qs

SEC+ ACRONYM DEFINITIONS

SEC+ ACRONYM DEFINITIONS

1st Grade

β€’

10 Qs

Bill gates

Bill gates

12th Grade - University

β€’

15 Qs

Flexible Roots

Flexible Roots

5th Grade

β€’

16 Qs

Graphics and Designs

Graphics and Designs

University

β€’

11 Qs

BIA Cyber Security Awareness Quiz - Session 1

BIA Cyber Security Awareness Quiz - Session 1

Assessment

Quiz

β€’

English

β€’

KG - Professional Development

β€’

Medium

Created by

Amal Salleh

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec β€’ 5 pts

Which is the weakest link in cybersecurity?​

Human

Technology

Policy

Fish

2.

MULTIPLE CHOICE QUESTION

30 sec β€’ 5 pts

Which of the following is the best passphrase?​

Baby shark dodododo​

Ambuyat Kismis Tarap Mian Belacan​

$tR0nG_P@55W0rD2022​

Password123

3.

MULTIPLE CHOICE QUESTION

30 sec β€’ 5 pts

Software that is designed to corrupt or gain unauthorized access to a computer system is also known as....​

Ransom Software

Spying software​

Malicious software​

Microsoft Word

4.

MULTIPLE CHOICE QUESTION

30 sec β€’ 5 pts

Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online is also known as....​

Advertisement software​​​

Spying software​

Ransom software

Application Software

5.

MULTIPLE CHOICE QUESTION

30 sec β€’ 5 pts

Which of the following is an example of Adware?​

Pop-up

Firewall

Keylogger

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec β€’ 5 pts

How can malware infiltrate your computer?​

Switch off computer

Downloading suspicious software, apps or files

Visiting social networking sites​

Type an email

7.

MULTIPLE CHOICE QUESTION

30 sec β€’ 5 pts

Unintentional download of malware onto your computer or mobile device is also known as....​

Malicious software​

Keylogger

Drive by download

Drive by car

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?