Computer Security Quiz

Computer Security Quiz

9th Grade

15 Qs

quiz-placeholder

Similar activities

B1 Deutsch

B1 Deutsch

9th Grade

20 Qs

All About Greetings

All About Greetings

9th - 12th Grade

10 Qs

AHS Health Final Review 4/8

AHS Health Final Review 4/8

9th Grade

10 Qs

Google Sheet Chapter 5

Google Sheet Chapter 5

9th Grade

18 Qs

5.GM.3.4 Indep Practice Part 1

5.GM.3.4 Indep Practice Part 1

5th Grade - University

10 Qs

first aid

first aid

9th Grade

18 Qs

Understanding Rights and Responsibilities

Understanding Rights and Responsibilities

9th Grade

15 Qs

REG HS ODF

REG HS ODF

9th - 12th Grade

12 Qs

Computer Security Quiz

Computer Security Quiz

Assessment

Quiz

Others

9th Grade

Practice Problem

Hard

Created by

Moha Gab

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main focus of computer security?

Safety, Protection, Measures

Freedom from Danger, Fear, Anxiety

Confidentiality, Integrity, Availability

Cyber Security, Network Security, Application Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does INSA stand for in Ethiopia?

Information Network and Cyber Security

Information Security and Protection Agency

International Security Network Association

Information Network Security Agency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the 90/10 rule in computer security?

90% technical, 10% good practices

10% technical, 90% good practices

50% technical, 50% good practices

30% technical, 70% good practices

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does CIA stand for in computer security?

Computer Information Agency

Control, Integrity, Authorization

Confidentiality, Integrity, Availability

Cybersecurity, Information, Applications

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main type of cyber-attack that involves flooding a system with excessive requests to make it unavailable?

Phishing

Man in the Middle

Malware Attack

Denial of Service (DoS)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the potential impact of computer security threats that involves the theft of services?

Illegal usage

Theft of services

Corruption of information

Destruction or loss of information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you physically secure your computer system?

Perform daily full system scans

Install reliable security software

Avoid clicking on email attachments

Change passwords regularly

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?