Cyber Security Basic Quiz

Cyber Security Basic Quiz

12th Grade

20 Qs

quiz-placeholder

Similar activities

business 1.4 revision

business 1.4 revision

KG - Professional Development

20 Qs

2.2.2 Data types

2.2.2 Data types

12th Grade

17 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Pengetahuan Dasar Komputer

Pengetahuan Dasar Komputer

9th - 12th Grade

20 Qs

Visual Basic Assessment

Visual Basic Assessment

11th - 12th Grade

21 Qs

BIM1014 Quiz 2

BIM1014 Quiz 2

KG - University

15 Qs

CORLANG Week6-7

CORLANG Week6-7

10th Grade - University

20 Qs

Cyber Security Basic Quiz

Cyber Security Basic Quiz

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

suvenna das

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Phishing is a type of bird species

Phishing is a type of cyber attack where attackers send fraudulent emails or messages to trick individuals into providing sensitive information such as passwords or credit card numbers.

Phishing is a type of fishing done in the ocean

Phishing is a type of gardening technique

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you identify a phishing email?

Look for suspicious links, requests for personal information, generic greetings, or spelling and grammar errors.

Ignore any spelling or grammar errors

Provide all requested personal information

Click on all the links in the email

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to use strong and unique passwords?

To make it easier for hackers to guess

To protect personal and sensitive information from unauthorized access and cyber attacks.

To share with others for convenience

To use the same password for multiple accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some best practices for password management?

Using strong and unique passwords for each account, enabling two-factor authentication, regularly updating passwords, and using a reputable password manager.

Never updating passwords

Using the same password for all accounts

Writing passwords down on a sticky note

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of cyber security?

Writing complex code

Using strong passwords

Installing antivirus software

Manipulation of individuals to divulge confidential information or perform actions that compromise security.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common social engineering tactics used by hackers?

Hacking, spamming, malware

Denial of service, ransomware, data breach

Firewall, encryption, antivirus

Phishing, pretexting, baiting, tailgating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are internet protocols?

A social media platform

A set of rules that govern the exchange of data over the internet.

A type of computer virus

A form of online payment

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?