Cybersecurity Quiz

Cybersecurity Quiz

University

30 Qs

quiz-placeholder

Similar activities

AHJN: Unit14-P1-Communication & Internet

AHJN: Unit14-P1-Communication & Internet

12th Grade - University

25 Qs

Hacking Technique Quiz 2

Hacking Technique Quiz 2

University

34 Qs

AHJN: Unit14-P2-Communication & Internet

AHJN: Unit14-P2-Communication & Internet

12th Grade - University

25 Qs

CNS_Semi-Final Quiz

CNS_Semi-Final Quiz

University

25 Qs

Module 1.1: Common Threats

Module 1.1: Common Threats

11th Grade - University

25 Qs

IT Essentials Ch 12 Review - Security

IT Essentials Ch 12 Review - Security

University

30 Qs

E-Security

E-Security

11th Grade - University

31 Qs

Year 9 End of Term Quiz

Year 9 End of Term Quiz

8th Grade - University

28 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Patrick Flowers

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following are ways that an 'identity thief' can obtain someone's credit card numbers and other pieces of identification?
Shoulder surfing at ATM machines
All of these
"Dumpster Diving" from a trash can
Stealing mail from mailboxes

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Let's say you have a credit card which has no balance due on it. You've decided not to use it anymore. No monthly statements show up for it and you don't carry it with you. There is no way an 'identity thief' can get this card's number. True or False?
True
False

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image
Which is an act of identity theft?
Receiving permission to use a parents’ credit card for school clothes
Wrongfully acquiring and using someone’s personal identification
Taking the identity of another individual as inspiration for a costume
Having the same name as another person

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image
An intentional effort to deceive another individual for personal gain
Mean people
Fake
Fraud
Crime

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Software that is installed on a computing device to prevent viruses from infecting the device.
Antivirus
Firewall
Phishing
Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used in phishing scams?

Sending personalized emails with legitimate-looking logos and links

Providing free giveaways without any prior interaction

Displaying pop-up ads with flashing colors and loud sounds

Offering unrealistic investment opportunities

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can someone avoid falling victim to a scam?

Click on suspicious links and attachments; provide personal information when asked; use weak passwords.

Ignore suspicious emails and links; visit any website without verifying its legitimacy; use the same password for all accounts.

Open emails from unknown senders; click on any link or attachment; use simple and easily guessable passwords.

Be cautious of suspicious emails, links, and attachments; verify website legitimacy; use strong passwords.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?