Exploring Cybersecurity Fundamentals

Exploring Cybersecurity Fundamentals

12th Grade

15 Qs

quiz-placeholder

Similar activities

Cyberbezpieczeństwo

Cyberbezpieczeństwo

8th Grade - University

10 Qs

Kuis JKI Kelas 8 Pertemuan Ke 2

Kuis JKI Kelas 8 Pertemuan Ke 2

8th Grade - University

10 Qs

Teknologi Jaringan Komputer dan Telekomunikasi

Teknologi Jaringan Komputer dan Telekomunikasi

10th Grade - University

20 Qs

INFORMATIKA X KURMER

INFORMATIKA X KURMER

10th Grade - University

17 Qs

PENCEGAHAN DAN PENANGANAN MALWARE

PENCEGAHAN DAN PENANGANAN MALWARE

9th Grade - University

20 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Kuis Ms Word 1

Kuis Ms Word 1

7th Grade - University

20 Qs

Table,Image formatting

Table,Image formatting

5th Grade - University

15 Qs

Exploring Cybersecurity Fundamentals

Exploring Cybersecurity Fundamentals

Assessment

Quiz

Information Technology (IT)

12th Grade

Practice Problem

Easy

Created by

NetworkHaz NetworkHaz

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary purpose of a firewall in network security?

To encrypt all outgoing emails

To block unauthorised access to or from a private network

To scan for malware on USB drives

To manage user passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a worm and a virus in malware analysis?

Worms require human action to spread, viruses do not

Viruses can self-replicate, worms cannot

Worms can self-replicate and spread without human action, viruses usually need a host file

Worms only infect mobile devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of a phishing email?

The email is sent from a known, trusted contact

The email contains poor spelling and grammar, and asks for sensitive information

The email is encrypted with AES-256

The email contains only images and no text

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption method is considered most secure for transmitting sensitive data over the internet?

Caesar cipher

Advanced Encryption Standard (AES)

ROT13

Base64 encoding

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in an effective incident response plan?

Eradication of the threat

Containment of the incident

Preparation and planning

Recovery of lost data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a Denial of Service (DoS) attack?

An attack that steals user credentials

An attack that encrypts files for ransom

An attack that overwhelms a system, making it unavailable to users

An attack that installs spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a cybersecurity policy in an organisation?

To provide technical support to users

To outline rules and procedures for protecting information assets

To monitor internet usage

To install antivirus software

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?