
Cybersecurity Quiz
Authored by Junice Ilagan
Other
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which scenario best illustrates an insider threat?
A hacker using a brute-force tool to guess a password
An employee accidentally sending sensitive files to the wrong email address
Malware entering through a compromised website
An attacker flooding a server with traffic
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is outdated software considered a security vulnerability?
It often runs slower, leading to user frustration
It lacks the latest features and aesthetics
It may contain unpatched security flaws that hackers can exploit
It consumes more computer memory
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best aligns with the 'Integrity' aspect of the CIA Triad?
Preventing unauthorized access to data
Ensuring data is accurate and unaltered
Making sure systems are always connected to the internet
Encrypting files for confidential transfer
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is NOT a common trait of phishing attacks?
Links to legitimate government websites
Requests for sensitive personal information
Messages creating urgency or fear
Emails disguised to look trustworthy
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the most likely consequence of using '12345' as a password?
A software error
The system will crash
Increased risk of unauthorized access
Loss of internet connection
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protection strategy provides an extra layer of security after entering a password?
Antivirus installation
Two-Factor Authentication (2FA)
Data encryption
Regular software updates
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a distinguishing characteristic of a DDoS attack?
One computer infecting another with malware
Continuous attempts to steal a user's password
Overwhelming a system with traffic to cause downtime
Sending fake emails to trick users
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Garantia Extendida
Quiz
•
University
11 questions
Calidad de Vida Laboral
Quiz
•
University
10 questions
CONCORDANCIA NOMINAL Y VERBAL
Quiz
•
University
10 questions
Facts and fiction about Oulu
Quiz
•
9th Grade - University
10 questions
Adobe Animate
Quiz
•
1st Grade - Professio...
10 questions
Leaders of The World
Quiz
•
KG - University
10 questions
KALIMAT EFEKTIF
Quiz
•
University
15 questions
sanctions et procédures disciplinaires
Quiz
•
1st Grade - Professio...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Other
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University