Cybersecurity AT (Revision)

Cybersecurity AT (Revision)

11th Grade

50 Qs

quiz-placeholder

Similar activities

kuis  Jaringan Internet

kuis Jaringan Internet

9th Grade - University

50 Qs

K11 - Giữa HK II - CS Cánh diều

K11 - Giữa HK II - CS Cánh diều

11th Grade

55 Qs

SUMATIF AKHIR SEMESTER KELAS VII

SUMATIF AKHIR SEMESTER KELAS VII

7th Grade - University

50 Qs

Pengalamatan Jaringan

Pengalamatan Jaringan

11th Grade

50 Qs

Ulangan Harian Bab V TIK Kelas XI

Ulangan Harian Bab V TIK Kelas XI

11th Grade

50 Qs

9.2 Homework 4

9.2 Homework 4

9th - 12th Grade

46 Qs

OCR Computer Science 1.3.2

OCR Computer Science 1.3.2

9th - 11th Grade

50 Qs

Q.1 Jaringan Komputer

Q.1 Jaringan Komputer

11th Grade

50 Qs

Cybersecurity AT (Revision)

Cybersecurity AT (Revision)

Assessment

Interactive Video

Computers

11th Grade

Hard

Created by

Roger Thompson

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "phishing" refer to in cybersecurity?

Phishing refers to a cyber attack that seeks to obtain sensitive information by deceiving users.
Phishing is a method of securing data through encryption.
Phishing refers to a type of malware that infects computers.
Phishing is a technique used to enhance network performance.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of cybersecurity?

To promote social media engagement.
To increase the speed of internet connections.
To enhance user experience on websites.
To protect systems and data from cyber threats.

3.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   cybersecurity is the process of ​ (b)   into a ​ (c)   so only people with the ​ (d)   can read it. It ​ (e)   from hackers and keeps information safe when stored or sent online.

Encryption in
changing information
secret code
correct key or password
protects data

4.

DRAG AND DROP QUESTION

1 min • 1 pt

The purpose of ​ (a)   (2FA) is to add an extra layer ​ (b)   by requiring ​ (c)   (like a password and a code sent to your phone). This makes it harder for​ (d)   to access accounts, even if they know the password.

two-factor authentication
of security
two forms of identification
hackers

5.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   in cybersecurity is when ​ (b)   into giving​ (c)   (like passwords or bank details) by ​ (d)   , such as tech support or a friend.

Social engineering
attackers trick people
away private information
pretending to be someone they trust

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of regular software updates in cybersecurity?

To comply with industry regulations and standards.
The purpose of regular software updates in cybersecurity is to patch vulnerabilities and enhance security.
To improve software performance and speed.
To add new features and functionalities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the practice of tricking individuals into providing sensitive information by pretending to be a trustworthy entity?

Spoofing

Phishing or social engineering

Scamming or social engineering

Hacking or social engineering

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?