Information Security Quiz for Students

Information Security Quiz for Students

12th Grade

10 Qs

quiz-placeholder

Similar activities

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

Network Security and Threats Quiz

Network Security and Threats Quiz

12th Grade

10 Qs

Unit 5 (OCR H446) TCP/IP, DNS, Networking Quiz

Unit 5 (OCR H446) TCP/IP, DNS, Networking Quiz

12th Grade

10 Qs

Technical Terms - Internet (A-Z) - Spoofing

Technical Terms - Internet (A-Z) - Spoofing

12th Grade

10 Qs

Data Transmission Security

Data Transmission Security

9th - 12th Grade

15 Qs

Part C Unit 10 Practice Exam

Part C Unit 10 Practice Exam

9th - 12th Grade

10 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Information Security Quiz for Students

Information Security Quiz for Students

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Tardelli Ronan Coelho Stekel

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a symmetric encryption technique?

RSA

AES

ECC

DSA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to secure communications over a computer network by encrypting the data?

HTTP

FTP

SSL/TLS

SMTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves an attacker intercepting and altering communication between two parties without their knowledge?

Phishing

Man-in-the-Middle

Denial of Service

Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control mechanism grants permissions based on the roles assigned to users within an organization?

Discretionary Access Control (DAC)

Role-Based Access Control (RBAC)

Mandatory Access Control (MAC)

Attribute-Based Access Control (ABAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in an incident response plan?

Containment

Eradication

Identification

Recovery

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common social engineering technique?

SQL Injection

Phishing

Buffer Overflow

Cross-Site Scripting (XSS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption technique uses two different keys, one for encryption and one for decryption?

Symmetric Encryption

Asymmetric Encryption

Hashing

Steganography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?