Terms in cyber security

Terms in cyber security

12th Grade

6 Qs

quiz-placeholder

Similar activities

Technical Terms - Internet (A-Z) - IPsec

Technical Terms - Internet (A-Z) - IPsec

12th Grade

10 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

11 Qs

Cyber Security

Cyber Security

8th - 12th Grade

10 Qs

G11 IT Security L2

G11 IT Security L2

12th Grade

10 Qs

Cybersecurity Fundamentals Week 2 Quiz

Cybersecurity Fundamentals Week 2 Quiz

KG - University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

12th Grade

10 Qs

System Vulnerabilities Quiz

System Vulnerabilities Quiz

12th Grade

10 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

Terms in cyber security

Terms in cyber security

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Razan Alghamdi undefined

Used 6+ times

FREE Resource

6 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

requiring multiple forms of verification

Multi-Factor Authentication

verifying a user's identity

Encryption

granting access to resources

Data Integrity

ensuring data has not been altered

Authentication

transforming data into a secure format

Authorization

2.

DRAG AND DROP QUESTION

1 min • 1 pt

The ​ (a)   can use​ ​ (b)   or​ ​ (c)   to attack your system

hacker
viruses
worms
firewall
antivirus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Back up your device means

Creating a copy of your device's data.
Transferring data to another device.
Updating your device's software.
Deleting all data from your device.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Breach is

A data breach is an incident where unauthorized access to sensitive data occurs.
A data breach is a legal term for data storage.
A data breach is a type of software update.
A data breach is a method of data encryption.

5.

MATCH QUESTION

1 min • 1 pt

Match the following

a protected network connection

Virtual Private Network

a form of social engineering attack

Firewall

A security system that monitors and controls incoming and outgoing network traffic

Phishing

computing services from remote servers

Malware

Software designed to disrupt, damage, or gain unauthorized access to computer systems

Cloud Computing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk Assessment is

the method of calculating financial returns.
a technique for improving employee performance.
the process of identifying, analyzing, and evaluating potential risks.
the act of creating a business plan.