Quiz about cybersecurity

Quiz about cybersecurity

University

7 Qs

quiz-placeholder

Similar activities

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

10th Grade - University

11 Qs

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

QUIZ

QUIZ

University

10 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

Securing Windows

Securing Windows

9th Grade - University

10 Qs

Computer and Network Security

Computer and Network Security

University

10 Qs

Phishing

Phishing

University

9 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

Quiz about cybersecurity

Quiz about cybersecurity

Assessment

Quiz

Computers

University

Easy

Created by

Jakub Filipek

Used 3+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an example of a cyber threat?

A natural disaster

A fire

A virus

A power outage

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a firewall?

To protect against physical intruders

To protect against malware

To encrypt data

To speed up internet connection

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a secure way to store passwords?

Writing them down on a piece of paper

Saving them in a plain text file on your computer

Using a password manager

Using the same password for multiple accounts

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main purpose of two-factor authentication?

To make it harder for hackers to guess your password

To prevent malware attacks

To encrypt data

To speed up internet connection

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is phishing?

A type of malware that infects your computer

A social engineering technique used to steal sensitive information

A denial-of-service attack that targets a specific website

A method of encrypting data to protect it from hackers

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What are some potential consequences of a data breach?

Financial loss and damage to reputation

Physical damage to equipment

Legal action against the victim

None of the above

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What are some best practices for protecting your personal devices from cyber threats?

Keep software up-to-date and use antivirus software

Use strong, unique passwords and two-factor authentication

Be cautious of suspicious emails and links

All of the above