Cybersecurity Quiz

Cybersecurity Quiz

9th - 12th Grade

58 Qs

quiz-placeholder

Similar activities

tom & jerry

tom & jerry

1st - 12th Grade

53 Qs

Vet Science CDE Dog Breeds

Vet Science CDE Dog Breeds

9th - 12th Grade

58 Qs

Disney Characters

Disney Characters

KG - University

59 Qs

Matter $ Properties of the Matter

Matter $ Properties of the Matter

6th - 12th Grade

61 Qs

TLE 10 - Q3 Computer Programming

TLE 10 - Q3 Computer Programming

10th Grade

60 Qs

video games

video games

KG - Professional Development

63 Qs

Friday Trivia Madness

Friday Trivia Madness

12th Grade

55 Qs

Marvel

Marvel

9th Grade - Professional Development

55 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Fun

9th - 12th Grade

Easy

Created by

Juwayriyah Hoosen

Used 1+ times

FREE Resource

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of vishing?

Fake website that collects your login details

Fraudulent SMS messages

A scammer calling you pretending to be your bank to get your PIN

Pop-up ads appearing on your browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The main goal of ransomware is to:

Gain free access to paid software

Steal data for resale

Force victims to pay money to regain access to files

Show advertisements online

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of phishing?

Unexpected emails with urgent requests for login details

A licensed software update from Microsoft

Messages from family members

Verified banking app notifications

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A worm can spread rapidly because it:

Disguises itself as legitimate software

Does not need to attach to files or programs to replicate

Requires human error to open an attachment

Can only spread through USB devices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a consequence of software piracy?

Supporting software developers financially

Higher risk of malware infection

Receiving regular updates and security patches

Stronger data protection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a keylogger record?

Screen activity

Internet traffic

Mouse clicks

Keyboard strokes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker is considered ethical?

Black hat hacker

Grey hat hacker

White hat hacker

Crackers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?