Cyber Security Camp
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
ASKI khanzaindonesia
Used 27+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is the difference between "http://" (without the "s") and "http://" (with the "s") at
the beginning of a URL?
That information entered into the site is encrypted
That the site has special high definition
That the site is not accessible to certain computers
That the site is the newest version available
2.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the following is a "phishing" attack example?
Sending a text message to someone that contains a malicious link disguised as a
notification that they have won a contest
Sending someone an email with a harmful link disguised as an email from someone
they know
Sending someone an email with a harmful link disguised as an email from someone
they know
All of the above
3.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the following options is the best for securing your router?
Disable remote management on your router
Once the router is configured, log out as the administrator.
Change the router’s default name and password
All of the above.
4.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Large corporations are the only ones targeted by cybercriminals. Is this statement true
or false?
True
False
5.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which option is the best for determining who in a company should be in charge of
cybersecurity?
They are in the best position to understand and promote cybersecurity within a
company, IT specialists are the finest candidates.
Owners of a company They are the ones that run the company, so they must be
familiar with cybersecurity fundamentals and put them into practice in order to
lower the danger of a cyberattack.
To lessen the danger of cyber assaults, all employees should have a basic
understanding of cybersecurity
Managers, because they are in charge of ensuring that employees follow the proper
procedures.
6.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
A networked group of computers used by hackers to steal information is referred to as
a...?
DDoS
Operating system
Botnet
Rootkit
7.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the four passwords listed below is the most secure?
PWh!5B
234560
Goat123
info*49
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Telco Practice Test 1
Quiz
•
Professional Development
15 questions
Technical Training
Quiz
•
Professional Development
12 questions
Vocaloid Quiz
Quiz
•
5th Grade - Professio...
12 questions
DECI - Week 9 - round
Quiz
•
Professional Development
11 questions
Typing words on keyboard (colours)
Quiz
•
KG - Professional Dev...
12 questions
Deci- Session 1- Time Machine
Quiz
•
Professional Development
11 questions
ChatGPT Quiz
Quiz
•
Professional Development
10 questions
Roblox
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
