Cybersecurity basics

Cybersecurity basics

1st - 5th Grade

15 Qs

quiz-placeholder

Similar activities

topologi_9=FN25

topologi_9=FN25

3rd Grade

20 Qs

Midterm Challenge

Midterm Challenge

2nd Grade

12 Qs

SE LIGA I - 2DS - ANÁLISE E PROJETO DE SISTEMAS

SE LIGA I - 2DS - ANÁLISE E PROJETO DE SISTEMAS

2nd Grade - University

20 Qs

Bab 3 Bagian A-D Pengenalan Komputer

Bab 3 Bagian A-D Pengenalan Komputer

1st Grade

15 Qs

Understanding APIs and Habit Tracker

Understanding APIs and Habit Tracker

2nd Grade - University

10 Qs

quiz ekskul

quiz ekskul

2nd Grade

14 Qs

História do Computador

História do Computador

1st Grade - University

10 Qs

Hardware & Software

Hardware & Software

3rd Grade

10 Qs

Cybersecurity basics

Cybersecurity basics

Assessment

Quiz

Information Technology (IT)

1st - 5th Grade

Practice Problem

Hard

Created by

Praful Jadhav

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What type of software protects against viruses?

Browser

Malware

Firewall

Antivirus

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What is the act of tricking people into revealing personal info called?

Spamming

Phishing

Surfing

Sniffing

3.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What do we call harmful software like viruses or ransomware?

Malware

Firewall

Software

Tracker

4.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What verifies your identity after a password (like OTP)?

Browsing

Authentication

Formatting

Encryption

5.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What is the term for a network security system that monitors and controls incoming and outgoing network traffic?

Switch

Firewall

Router

Modem

6.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What do we call the practice of securing a computer system by preventing unauthorized access?

Access Control

Security

Encryption

Hacking

7.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What do we call a technique used to protect networks from unauthorized access by filtering traffic?

Proxy

Firewall

Router

Switch

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?