
Exploring Cybersecurity Fundamentals
Authored by NetworkHaz NetworkHaz
Information Technology (IT)
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a primary purpose of a firewall in network security?
To encrypt all outgoing emails
To block unauthorised access to or from a private network
To scan for malware on USB drives
To manage user passwords
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main difference between a worm and a virus in malware analysis?
Worms require human action to spread, viruses do not
Viruses can self-replicate, worms cannot
Worms can self-replicate and spread without human action, viruses usually need a host file
Worms only infect mobile devices
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common sign of a phishing email?
The email is sent from a known, trusted contact
The email contains poor spelling and grammar, and asks for sensitive information
The email is encrypted with AES-256
The email contains only images and no text
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which encryption method is considered most secure for transmitting sensitive data over the internet?
Caesar cipher
Advanced Encryption Standard (AES)
ROT13
Base64 encoding
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in an effective incident response plan?
Eradication of the threat
Containment of the incident
Preparation and planning
Recovery of lost data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a Denial of Service (DoS) attack?
An attack that steals user credentials
An attack that encrypts files for ransom
An attack that overwhelms a system, making it unavailable to users
An attack that installs spyware
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of a cybersecurity policy in an organisation?
To provide technical support to users
To outline rules and procedures for protecting information assets
To monitor internet usage
To install antivirus software
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Table,Image formatting
Quiz
•
5th Grade - University
10 questions
Kuis JKI Kelas 8 Pertemuan Ke 2
Quiz
•
8th Grade - University
12 questions
UX: Week 2 CFU
Quiz
•
12th Grade
20 questions
Teknologi Jaringan Komputer dan Telekomunikasi
Quiz
•
10th Grade - University
10 questions
LITERASI DIGITAL
Quiz
•
12th Grade
15 questions
Ulangan Harian 1
Quiz
•
9th Grade - University
15 questions
Recap Handout 3 & 4
Quiz
•
6th Grade - University
20 questions
Kuis Ms Word 1
Quiz
•
7th Grade - University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade
10 questions
Valentine's Day Trivia
Quiz
•
9th - 12th Grade