18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

Security II

Security II

11th Grade

15 Qs

cybersecurity_1

cybersecurity_1

12th Grade

14 Qs

Network Security Threats Quiz

Network Security Threats Quiz

10th Grade

13 Qs

Digital Technology Year 9 Diagnostic

Digital Technology Year 9 Diagnostic

9th Grade

16 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

cybersecurity Do now week2

cybersecurity Do now week2

12th Grade

7 Qs

1.1.3 Cybersecurity Email and Social Media

1.1.3 Cybersecurity Email and Social Media

9th - 12th Grade

7 Qs

18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

Assessment

Passage

Computers

9th - 12th Grade

Medium

Created by

Andy Workman

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of cybersecurity?

D. Protecting data from social engineering

A. Protecting only networks from unauthorized access

B. Protecting networks, computers, programs, and data from attack, damage, and unauthorized access

C. Protecting computers from malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering technique?

A. Virus

D. Spyware

B. Phishing

C. Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for any computer code written with the intent to cause damage, disruption, or inconvenience?

D. Authentication

B. Malware

A. Firewall

C. Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common security threat related to passwords?

A. Strong and unique passwords

D. Biometric authentication

B. Weak and default passwords

C. Multi-factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for any secondary storage device which can easily introduce harmful software to a network?

A. Optical disks

B. Memory cards

D. Portable desktop hard drives

C. USB pens

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the potential risk of using out-of-date software?

C. Vulnerability to malware

B. Enhanced security

A. Increased performance

D. Improved user experience

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a social engineering technique?

B. Phishing

A. Blagging

C. Shoulder surfing

D. Malware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?