Cyber Security Quiz

Cyber Security Quiz

10th Grade

7 Qs

quiz-placeholder

Similar activities

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

Computer Basics

Computer Basics

5th - 12th Grade

10 Qs

NETWORK DEVICES

NETWORK DEVICES

10th Grade

10 Qs

Cybersecurity Resilience

Cybersecurity Resilience

10th Grade

10 Qs

Online Safety and Security

Online Safety and Security

10th Grade

5 Qs

Dampak Sosial Informatika

Dampak Sosial Informatika

10th Grade

12 Qs

Exploring the Internet of Things

Exploring the Internet of Things

9th Grade - University

10 Qs

Past paper Jan/2022

Past paper Jan/2022

9th - 12th Grade

9 Qs

Cyber Security Quiz

Cyber Security Quiz

Assessment

Quiz

Computers

10th Grade

Medium

Created by

VANITA C

Used 115+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Companies have become more dependent on digital tools and systems. That makes them ____________ to hacking:

Vulnerable

Less of a target

Resistant

Unattractive

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

On the internet, security and loss of digital value are experienced as:

No answer

Less probable

Abstract

Complicated

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

How many organizations worldwide experienced phishing in 2019?

88%

20%

55%

6%

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Can a password from your old MySpace account provide access to valuable information if it falls into the wrong hands?

I don't know

No, who is even using MySpace today?

Absolutely!

No, I am not using the account anymore.

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

IT criminality is estimated to be the world's 13th largest economy?


No answer

Wrong Question

False

True

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

An attempt to harm, damage or cause threat to a system or network is broadly termed as ...............

System hijacking

Cyber-crime

Digital crime

Cyber Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Compromising confidential information comes under ..................

Bug

Threat

Vulnerability

Attack