Cyber Security - Quizizz
Cyber Security - Quizizz
Cyber Security - Quizizz
Worksheets Name
Cyber Security
Class
Total questions: 40
Worksheet time: 21mins
Date
Instructor name: Deleted User
a) Antivirus b) Phishing
2. What's the name given to the attempt to obtain sensitive information such as usernames and
passwords, by disguising as a trustworthy entity in an electronic communication (e.g. creating a
fake website)?
a) Phishing b) Trojan
c) Ransomware d) Virus
3. What's the name given to the cyber-attack where the perpetrator seeks to make a machine
unavailable to its intended users by temporarily disrupting its services, typically accomplished
by flooding the targeted machine in an attempt to overload it?
a) Spam b) Ransomware
4. What's the name given to the malicious software that threatens to publish the victim's data or
perpetually block access to it unless a ransom is paid?
a) Ransomware b) Spam
a) Ransomware b) CyberBullying
https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 1/8
3/18/24, 12:14 AM Cyber Security | Quizizz
a) CyberBullying b) Ransomware
7. Viruses, worms, and trojans are common security threats that are often used in spreading.
What is the name for them all?
a) scams b) passwords
c) malware d) downloads
8. While Trish was playing an online game, a pop-up appeared, prompting her to click on the
flashing lights to receive more points for her game. What should she do?
a) Click the X in the corner of the pop-up to b) Click on the flashing lights.
make it go away.
c) Save the pop-up message until she really d) Turn off the game and the gaming console.
needs extra points to win.
a) phishing b) spyware
c) trojans d) worms
10. Fake e-mail message appearing to be from a trusted business, social network or other contact
Asks for personal information or requests a user to click on a link or download a file to verify
personal information Hackers can secretly collect personal information and passwords
a) spyware b) worms
c) phishing d) pharming
11. Malicious code that secretly watches your computer activity and sends the information over
the Internet; can secretly capture your keystrokes (including passwords) and compromise
your identity
a) virus b) spyware
c) worms d) phishing
https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 2/8
3/18/24, 12:14 AM Cyber Security | Quizizz
12. Special types of viruses that can travel from computer to computer without human action;
self-replicating and can multiply until it uses up the computer's resources
a) trojans b) phishing
c) spyware d) worms
a) black hat hackers and white hat hackers b) viruses and trojans
c) the ongoing effort to protect these d) the ongoing effort to attack networked
networked systems and all of the data from systems and all of the data
unauthorized use or harm
14. Company policies should restrict access to the information to authorized personnel and
ensure that only those authorised individuals view this data.
a) Integrity b) Confidentiality
c) Availability
15. Maintaining equipment, performing hardware repairs, keeping operating systems and
software up to date, and creating backups ensure the availability of the network and data to
the authorised users.
a) Confidentiality b) Availability
c) Integrity
16. Data must be unaltered during transit (being sent between people) and not changed by
unauthorised entities.
a) Availability b) Confidentiality
c) Integrity
https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 3/8
3/18/24, 12:14 AM Cyber Security | Quizizz
19.
c) Extremely time consuming to fix the d) You will likely lose your job
problem
c) breach
c) Copier d) Scanner
a) Virus b) Malware
c) Tell your friend not to delete your data d) Only allow access with a user ID and
password
https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 4/8
3/18/24, 12:14 AM Cyber Security | Quizizz
25. In order to restrict access to secure data, a system of _____ should be used?
26. Converting data into a secret code so that it cannot be read by an unauthorised person is
called _____ ?
a) Encryption b) Incription
c) De-encryption d) Prescription
28. _____ indicates a secure connection between your computer and a trusted website?
a) html b) https
c) http d) tcp
29. What's the best way of protecting your computer against viruses
https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 5/8
3/18/24, 12:14 AM Cyber Security | Quizizz
a) .jpeg b) .png
c) .exe d) .doc
36. What is the name given to the malware that disguises itself as something useful
a) Spyware b) Trojan
c) Virus d) Keylogger
a) An Employee b) A Spy
c) A Hacker d) A Teacher
a) Passwords b) Encryption
39. A program or hardware device that filters the data coming through the internet connection
a) Firewall b) Anti-spyware
https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 6/8
3/18/24, 12:14 AM Cyber Security | Quizizz
Answer Keys
31. c) Software code 32. d) Corrupt your files 33. a) The Computer Misuse
Act
https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 7/8
3/18/24, 12:14 AM Cyber Security | Quizizz
https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 8/8