Cyber Security

Cyber Security

Professional Development

5 Qs

quiz-placeholder

Similar activities

Monday Briefing Cybersecurity

Monday Briefing Cybersecurity

Professional Development

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

9 Qs

Data Ethics and Security

Data Ethics and Security

Professional Development

8 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

Professional Development

6 Qs

NE Pilot

NE Pilot

Professional Development

9 Qs

Mini Quiz

Mini Quiz

Professional Development

7 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Sireesha Rodda

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a type of malicious software that locks data and demands payment for its release?
spyware
ransomware
phishing
firewall

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the purpose of a firewall in cyber security?
to clean viruses from a computer
to block unauthorised access to network
to store passwords securely
to monitor physical security

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of these is an example of a phishing attack?
A hacker physically stealing a computer
A fake email pretending to be from a bank asking for login details
A program that speeds up computer performance
A tool that helps in software development

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is the best practice for creating a strong password?
Using "password123" for all accounts
A combination of uppercase, lowercase, numbers, and symbols
Writing the password on a sticky note
Using the same password for all accounts

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is Multi-Factor Authentication (MFA)?
A process of sending multiple emails at once
A security method that requires multiple forms of verification (e.g., password + OTP)
A technique for encrypting emails
A type of cyber attack