Computer Security Quiz

Computer Security Quiz

9th Grade

15 Qs

quiz-placeholder

Similar activities

AP Science Exam SPHS

AP Science Exam SPHS

9th - 12th Grade

17 Qs

Exploring Animal Tissues

Exploring Animal Tissues

9th Grade

20 Qs

presentation

presentation

9th - 12th Grade

13 Qs

First Day

First Day

9th - 12th Grade

10 Qs

DOST SCIQUIZ REVIEWER

DOST SCIQUIZ REVIEWER

9th - 12th Grade

15 Qs

Finding the Epicenter KC

Finding the Epicenter KC

9th - 12th Grade

10 Qs

News item text

News item text

9th - 12th Grade

10 Qs

Understanding Information Texts

Understanding Information Texts

9th Grade

18 Qs

Computer Security Quiz

Computer Security Quiz

Assessment

Quiz

Others

9th Grade

Practice Problem

Hard

Created by

Moha Gab

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main focus of computer security?

Safety, Protection, Measures

Freedom from Danger, Fear, Anxiety

Confidentiality, Integrity, Availability

Cyber Security, Network Security, Application Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does INSA stand for in Ethiopia?

Information Network and Cyber Security

Information Security and Protection Agency

International Security Network Association

Information Network Security Agency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the 90/10 rule in computer security?

90% technical, 10% good practices

10% technical, 90% good practices

50% technical, 50% good practices

30% technical, 70% good practices

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does CIA stand for in computer security?

Computer Information Agency

Control, Integrity, Authorization

Confidentiality, Integrity, Availability

Cybersecurity, Information, Applications

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main type of cyber-attack that involves flooding a system with excessive requests to make it unavailable?

Phishing

Man in the Middle

Malware Attack

Denial of Service (DoS)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the potential impact of computer security threats that involves the theft of services?

Illegal usage

Theft of services

Corruption of information

Destruction or loss of information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you physically secure your computer system?

Perform daily full system scans

Install reliable security software

Avoid clicking on email attachments

Change passwords regularly

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?