Security Threats MCQs

Security Threats MCQs

11th Grade

10 Qs

quiz-placeholder

Similar activities

20. Cybersecurity Malware Quiz

20. Cybersecurity Malware Quiz

9th - 12th Grade

11 Qs

18. Cyber security threats Quiz

18. Cyber security threats Quiz

9th - 12th Grade

11 Qs

societal impacts class12

societal impacts class12

KG - 12th Grade

10 Qs

IT Unit 11 Cyber Security Key Terms

IT Unit 11 Cyber Security Key Terms

11th - 12th Grade

10 Qs

SLR 4 - Cyber Security Threats - part 1

SLR 4 - Cyber Security Threats - part 1

9th - 11th Grade

10 Qs

Network Advantages and Disadvantages

Network Advantages and Disadvantages

10th Grade - University

15 Qs

ICT test by Michael

ICT test by Michael

11th Grade

10 Qs

EMPTECH Lesson 2 - STEM 1

EMPTECH Lesson 2 - STEM 1

11th Grade

8 Qs

Security Threats MCQs

Security Threats MCQs

Assessment

Quiz

Computers

11th Grade

Easy

Created by

David Kang

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is hacking?

Observing someone's PIN at an ATM

Unauthorized access to systems or networks to steal or damage data

Sending legitimate emails to multiple recipients

Protecting a system using firewalls

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method to prevent hacking?

Using strong passwords

Installing firewalls

Unpatched software

Enabling two-factor authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of phishing attacks?

Install anti-malware software

Gain personal information by impersonating trusted sources

Increase internet speed

Create fake websites

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of phishing uses SMS messages to target users?

Pharming

Smishing

Vishing

Keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is pharming?

Redirecting users to fake websites to steal information

Sending fraudulent emails

Tracking animals using RFID

Observing passwords through surveillance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of malware?

Computer virus

Firewalls

Antivirus software

Strong passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does spyware typically operate?

Acts as legitimate software while spying on the user's activities

Protects systems from malicious attacks

Deletes all data from a computer

Encrypts user files for ransom

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?