Cyber Threats Quiz

Cyber Threats Quiz

10th Grade

10 Qs

quiz-placeholder

Similar activities

Communication & Networking - Security Measures

Communication & Networking - Security Measures

2nd - 12th Grade

10 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Module 9-Address Resolution Protocol

Module 9-Address Resolution Protocol

9th Grade - Professional Development

10 Qs

Communication & Networking - Differences Between LAN & WAN

Communication & Networking - Differences Between LAN & WAN

2nd - 12th Grade

10 Qs

Network Fundamentals-Physical layer

Network Fundamentals-Physical layer

9th Grade - Professional Development

14 Qs

INTERNET AND INTRANET

INTERNET AND INTRANET

9th - 11th Grade

10 Qs

Mini Test 2 (Network Topologies)

Mini Test 2 (Network Topologies)

9th - 11th Grade

12 Qs

AP CSP BI 4

AP CSP BI 4

9th - 12th Grade

12 Qs

Cyber Threats Quiz

Cyber Threats Quiz

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Shelley Hibbert

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?

A type of malware that encrypts files

A legitimate way to verify user identities

A technique used to trick individuals into providing sensitive information

A method of strengthening network security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a Malware threat?

Two-factor authentication

Firewall

Virus

CAPTCHA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Social Engineering in the context of cyber security?

The process of improving social skills

The technical means to gain unauthorized access to a computer system

The use of deception to manipulate individuals into divulging confidential information

A method of encrypting data to protect it from theft

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a Denial of Service (DoS) attack?

To encrypt the target's files and demand a ransom

To steal sensitive information from the target

To make a computer or network resource unavailable to its intended users

To gain unauthorized access to a network

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes Ransomware?

A tool to detect network intrusions

A type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid

A method of securely transmitting data over the internet

A program that helps improve computer performance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Data Breach?

A method of compressing data to save space

A secure way to store data in the cloud

An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner

A technique for recovering lost data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Adware

Firewall

Spyware

Ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?