Cyber Security

Cyber Security

Professional Development

5 Qs

quiz-placeholder

Similar activities

MR ELKANA

MR ELKANA

Professional Development

7 Qs

Cybersecurity Awareness Quiz

Cybersecurity Awareness Quiz

Professional Development

10 Qs

Pre-Test

Pre-Test

Professional Development

10 Qs

LAC Quizz

LAC Quizz

Professional Development

8 Qs

Bootcamp DTSFGA Modul 12 dan 13 CCT

Bootcamp DTSFGA Modul 12 dan 13 CCT

Professional Development

10 Qs

PDSB 210622

PDSB 210622

University - Professional Development

10 Qs

Evaluación de Seguridad en Spring

Evaluación de Seguridad en Spring

Professional Development

10 Qs

PC Security

PC Security

Professional Development

10 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Sireesha Rodda

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a type of malicious software that locks data and demands payment for its release?
spyware
ransomware
phishing
firewall

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the purpose of a firewall in cyber security?
to clean viruses from a computer
to block unauthorised access to network
to store passwords securely
to monitor physical security

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of these is an example of a phishing attack?
A hacker physically stealing a computer
A fake email pretending to be from a bank asking for login details
A program that speeds up computer performance
A tool that helps in software development

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is the best practice for creating a strong password?
Using "password123" for all accounts
A combination of uppercase, lowercase, numbers, and symbols
Writing the password on a sticky note
Using the same password for all accounts

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is Multi-Factor Authentication (MFA)?
A process of sending multiple emails at once
A security method that requires multiple forms of verification (e.g., password + OTP)
A technique for encrypting emails
A type of cyber attack