How cybersecure are you?

How cybersecure are you?

12th Grade

15 Qs

quiz-placeholder

Similar activities

IQ-WIZ-EMTECH

IQ-WIZ-EMTECH

12th Grade

10 Qs

Chapter 1: Getting Started with Digital Media

Chapter 1: Getting Started with Digital Media

12th Grade

19 Qs

G11 IT Security L2

G11 IT Security L2

12th Grade

10 Qs

AP CSP Cybersecurity & Global Impacts Quiz

AP CSP Cybersecurity & Global Impacts Quiz

12th Grade

15 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

Identity Theft

Identity Theft

8th - 12th Grade

12 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

Post Assessment - Cybersecurity Awareness

Post Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

How cybersecure are you?

How cybersecure are you?

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ming Yaw Loo

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.        Why are deepfakes called ‘deepfakes’?

A. People can’t tell the difference between what is real and what is fake.

B. The term ‘deep’ comes from the underlying technology of ‘deep learning’ which is a form of artificial intelligence.

C. Machine learning manipulates or generates visual and audio content with the intention to deceive.

D. All of the above.

Answer explanation

The word deepfake comes from a combination of the words ‘deep learning’ and ‘fake’ referring to how a person in an existing image or video is replaced with another person’s likeness using machine learning and artificial intelligence to make it as realistic as possible.

Deepfake technology is a threat to cybersecurity as it can be used to create scams, false claims, and hoaxes that undermine and destabilise organisations.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. Disinformation can spread easily through fake accounts, which can be created by bots and / or humans. How many fake accounts do you think was taken down by Facebook in the year 2021?

A. More than 6 billion fake accounts

B. Slightly less than 5 billion fake accounts

C. About 2 billion fake accounts

D. Less than 1 billion fake accounts

Answer explanation

*data taken from Statista: https://www.statista.com/statistics/1013474/facebook-fake-account-removal-quarter/

In 2021 alone, more than 6 billion fake accounts were found by Facebook! That is practically the same number of people in the entire world. This reminds us about the importance of being wary of strangers and information that we receive on social media.

Fake accounts are a cybersecurity concern as the misinformation they provide can divide and destabilise societies.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

3. An organisation employing people to make deliberately offensive or provocative online posts in order to cause conflict or manipulate public opinion is known as ________.

Answer explanation

A study into troll farms have showed that 30 different governments worldwide have paid keyboard armies to spread propaganda and attack critics, which could divide societies and destabilise a country.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. In Singapore, fake news is combated by a regulation called POFMA. What does POFMA stand for?

Protection from Online Falsehoods and Manipulation Act

Protection from Online Falsity and Manipulation Act

Prosecution from Overseas Falsehoods and Manipulation Act

Protection from Online Falsehoods and Monitoring Act

Answer explanation

Created in 2019, POFMA allows the government to ask parties who have placed false information online to make corrections to falsehoods, indicate that an information previously communicated was false or to remove the false information completely. This increases Singapore’s cybersecurity as it helps to prevent disinformation from spreading.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. What is the most basic form of defense against a cyber attack to stop unusual network connections?

A. Anti-Virus

B. Firewalls

C. Encryption

D. Passwords

Answer explanation

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organisation's previously established security policies.

A firewall is an important component of cybersecurity and ensures that hackers or malware cannot immediately access any digital device that is connected to the internet.

At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. Which of the following is an example of Internet Protocol (IP) spoofing?

A. SQL injections

B. Cross-Site scripting

C. ARP poisoning

D. Man-in-the-middle attack

Answer explanation

A man in the middle (MITM) attack is a general term when a perpetrator positions himself in a conversation between a user and an application – either to eavesdrop or to impersonate one of the parties.

This attack is useful for stealing personal information, such as login credentials, account details and credit card numbers. This compromises cybersecurity as the data stolen can be used to perpetrate further attempts of fraud or even steal classified information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. A botnet is_______.

A. A computer which has been infected with blocks of code to perform malicious tasks

B. A computer virus that propagates itself from computer to computer via e-mail

C. A collected of infected computers controlled through a command-and-control server

D. An application program that attacks computer networks

Answer explanation

A botnet (derived from 'robot network') is a large group of malware-infected internet-connected devices and computers controlled by a single operator (a single infected device is called a botnet drone).

Attackers use these compromised devices to launch large-scale attacks that compromises cybersecurity as they can disrupt website services, steal credentials or gain unauthorized access to critical infrastructure in a country such as defence, banking, communication and health sectors.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?