Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

80 Qs

quiz-placeholder

Similar activities

Ôn Tập KTCK2_Tin12_HK2_2024

Ôn Tập KTCK2_Tin12_HK2_2024

12th Grade

76 Qs

Mega Quiz

Mega Quiz

11th Grade - Professional Development

85 Qs

Quiz Berpikir Komputasional 9

Quiz Berpikir Komputasional 9

9th Grade - University

80 Qs

pkk ( produk kreatif dan kewirausahaan

pkk ( produk kreatif dan kewirausahaan

12th Grade

80 Qs

Google Apps Final Review

Google Apps Final Review

9th - 12th Grade

85 Qs

Redes Parcial 2

Redes Parcial 2

12th Grade - University

77 Qs

NGÂN HÀNG CÂU HỎI  GIƯA KÌ 2 TIN 10

NGÂN HÀNG CÂU HỎI GIƯA KÌ 2 TIN 10

9th - 12th Grade

83 Qs

CÂU HỎI TRẮC NGHIỆM BÀI 6-7-8-9 LỚP 12

CÂU HỎI TRẮC NGHIỆM BÀI 6-7-8-9 LỚP 12

12th Grade

77 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Quintasia Hurt

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The fraudulent practice of sending emails claiming to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, is also known as ____.

phishing

white hat hacking

instant messaging

surfing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When thieves steal your personal information to take over or open new accounts, file fake tax returns, rent or buy properties, or do other criminal things in your name, you have been a victim of identity ____.

theft

spamming

encryption

surfing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Denial of access or of misusing websites or computer networks is known as _____.

hacking

spoofing

skipping

spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malicious software that threatens to publish the victim's information or block access to it unless a fee is paid is called ____.

ransomware

cryptoware

spyware

trojan

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After an intrusion has occurred and the intruder has been removed from the system, the next step is to ____.

recover and restore functionality

deploy new countermeasures

update the security policy

delete all logs regarding the incident

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An important aspect of evidence gathering is _____.

backing up all log files

monitoring user access to compromised systems

purging transaction logs

restoring damaged data from backup media

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The network administrator has recently discovered information on a computer drive that might indicate evidence of illegal activity. To perform forensic activities on the disk to see what kind of information it contains, the first step is to _____.

make a bit-level copy of the disk

fire the employee who uses the computer

obtain a search warrant

run forensic tools to examine the hard drive contents

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?