Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

quiz-placeholder

Similar activities

Quiz

Quiz

9th Grade - University

15 Qs

Quiz one

Quiz one

University

12 Qs

Ergo 2 - Quiz -Team 1

Ergo 2 - Quiz -Team 1

University

12 Qs

Lecture 12

Lecture 12

University

10 Qs

Module 2 Basic Switch and End Device Configuration Quiz

Module 2 Basic Switch and End Device Configuration Quiz

University

14 Qs

BSHM 1A-Applied Business Tools- Quiz no.1 (Prelim)

BSHM 1A-Applied Business Tools- Quiz no.1 (Prelim)

University

10 Qs

MBA-MIS

MBA-MIS

University

13 Qs

CCNA 7: Cap 1 Quiz

CCNA 7: Cap 1 Quiz

University

9 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Other

University

Easy

Created by

Junice Ilagan

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scenario best illustrates an insider threat?

A hacker using a brute-force tool to guess a password

An employee accidentally sending sensitive files to the wrong email address

Malware entering through a compromised website

An attacker flooding a server with traffic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is outdated software considered a security vulnerability?

It often runs slower, leading to user frustration

It lacks the latest features and aesthetics

It may contain unpatched security flaws that hackers can exploit

It consumes more computer memory

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best aligns with the 'Integrity' aspect of the CIA Triad?

Preventing unauthorized access to data

Ensuring data is accurate and unaltered

Making sure systems are always connected to the internet

Encrypting files for confidential transfer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a common trait of phishing attacks?

Links to legitimate government websites

Requests for sensitive personal information

Messages creating urgency or fear

Emails disguised to look trustworthy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most likely consequence of using '12345' as a password?

A software error

The system will crash

Increased risk of unauthorized access

Loss of internet connection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protection strategy provides an extra layer of security after entering a password?

Antivirus installation

Two-Factor Authentication (2FA)

Data encryption

Regular software updates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a distinguishing characteristic of a DDoS attack?

One computer infecting another with malware

Continuous attempts to steal a user's password

Overwhelming a system with traffic to cause downtime

Sending fake emails to trick users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?