Cybersecurity Quiz

Cybersecurity Quiz

11th Grade

10 Qs

quiz-placeholder

Similar activities

File Management Part 2

File Management Part 2

9th - 12th Grade

10 Qs

Cyber Security

Cyber Security

9th - 12th Grade

15 Qs

Common Protocols

Common Protocols

10th - 12th Grade

15 Qs

IGCSE Chapter 8 - Safety & Security

IGCSE Chapter 8 - Safety & Security

11th Grade

12 Qs

Computer Science :- Malware , HTML , Search Engine..!

Computer Science :- Malware , HTML , Search Engine..!

9th Grade - University

15 Qs

Grade5-Week12

Grade5-Week12

5th Grade - University

11 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Google Drive

Google Drive

KG - University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Sheena Hunt

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is Phishing?

A type of malware that encrypts files and demands payment

The practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information

An attack that makes a machine or network resource unavailable to its intended users

Software designed to disrupt, damage, or gain unauthorized access to a computer system

Answer explanation

Phishing is the practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a characteristic of Ransomware?

It steals personal information for identity theft

It encrypts files and demands payment for the decryption key

It secretly records the keystrokes of the user

It is used to perform a distributed denial-of-service attack

Answer explanation

Ransomware encrypts files and demands payment for the decryption key, making it a characteristic of this type of malware.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

DDoS attacks are designed to:

Encrypt vital data and files until a ransom is paid

Send out fraudulent emails from a trusted entity

Prevent legitimate users from accessing a service

Exploit previously unknown vulnerabilities in software

Answer explanation

DDoS attacks are designed to prevent legitimate users from accessing a service, causing disruption by overwhelming the target with a flood of traffic.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Social engineering involves manipulating individuals into breaking security procedures.

True

False

Answer explanation

The statement is true because social engineering involves manipulating individuals to bypass security measures.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Zero-day exploits are attacks that occur after a security vulnerability has been fixed.

True

False

Answer explanation

Zero-day exploits actually occur before a security vulnerability is fixed, making the statement false.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Identify the cyber threat described as a malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

DDoS Attack

Spyware

Malware

Trojan Horse

Answer explanation

The correct choice is Malware, which is a malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

John receives an email from what seems to be his bank, asking him to update his personal information through a provided link. Suspecting this might be a scam, what should John do first?

Click on the link to see if it looks legitimate

Reply to the email asking for more details

Forward the email to his friends to get their opinion

Contact his bank through official channels to verify the email's legitimacy

Answer explanation

John should contact his bank through official channels to verify the email's legitimacy, as this is the safest way to confirm if the email is a scam or not.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?