
Cybersecurity Quiz

Quiz
•
Computers
•
11th Grade
•
Medium
Sheena Hunt
Used 3+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is Phishing?
A type of malware that encrypts files and demands payment
The practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information
An attack that makes a machine or network resource unavailable to its intended users
Software designed to disrupt, damage, or gain unauthorized access to a computer system
Answer explanation
Phishing is the practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a characteristic of Ransomware?
It steals personal information for identity theft
It encrypts files and demands payment for the decryption key
It secretly records the keystrokes of the user
It is used to perform a distributed denial-of-service attack
Answer explanation
Ransomware encrypts files and demands payment for the decryption key, making it a characteristic of this type of malware.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
DDoS attacks are designed to:
Encrypt vital data and files until a ransom is paid
Send out fraudulent emails from a trusted entity
Prevent legitimate users from accessing a service
Exploit previously unknown vulnerabilities in software
Answer explanation
DDoS attacks are designed to prevent legitimate users from accessing a service, causing disruption by overwhelming the target with a flood of traffic.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Social engineering involves manipulating individuals into breaking security procedures.
True
False
Answer explanation
The statement is true because social engineering involves manipulating individuals to bypass security measures.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Zero-day exploits are attacks that occur after a security vulnerability has been fixed.
True
False
Answer explanation
Zero-day exploits actually occur before a security vulnerability is fixed, making the statement false.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Identify the cyber threat described as a malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
DDoS Attack
Spyware
Malware
Trojan Horse
Answer explanation
The correct choice is Malware, which is a malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
John receives an email from what seems to be his bank, asking him to update his personal information through a provided link. Suspecting this might be a scam, what should John do first?
Click on the link to see if it looks legitimate
Reply to the email asking for more details
Forward the email to his friends to get their opinion
Contact his bank through official channels to verify the email's legitimacy
Answer explanation
John should contact his bank through official channels to verify the email's legitimacy, as this is the safest way to confirm if the email is a scam or not.
Create a free account and access millions of resources
Similar Resources on Wayground
9 questions
Internet Protocols

Quiz
•
10th - 11th Grade
12 questions
Online Communications Technologies

Quiz
•
9th - 12th Grade
15 questions
Cybersecurity Awareness Quiz

Quiz
•
9th Grade - University
10 questions
Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Quiz
•
9th Grade - University
14 questions
Cyber Security - Social Engineering

Quiz
•
10th - 11th Grade
10 questions
Microsoft Teams

Quiz
•
KG - 12th Grade
14 questions
Malware And Hackers

Quiz
•
KG - University
10 questions
Post Assessment - Cybersecurity Awareness

Quiz
•
9th Grade - Professio...
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade