Cyber Security - Quizizz

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

3/18/24, 12:14 AM Cyber Security | Quizizz

Worksheets Name

Cyber Security
Class
Total questions: 40
Worksheet time: 21mins
Date
Instructor name: Deleted User

1. Which one of the following is NOT a security threat?

a) Antivirus b) Phishing

c) Worm d) Black Hat Hacking

2. What's the name given to the attempt to obtain sensitive information such as usernames and
passwords, by disguising as a trustworthy entity in an electronic communication (e.g. creating a
fake website)?

a) Phishing b) Trojan

c) Ransomware d) Virus

3. What's the name given to the cyber-attack where the perpetrator seeks to make a machine
unavailable to its intended users by temporarily disrupting its services, typically accomplished
by flooding the targeted machine in an attempt to overload it?

a) Spam b) Ransomware

c) Cyberbullying d) Denial of Service (DoS)

4. What's the name given to the malicious software that threatens to publish the victim's data or
perpetually block access to it unless a ransom is paid?

a) Ransomware b) Spam

c) Denial of Service (DoS) d) CyberBullying

5. Which one of the following is NOT a type of CyberSecurity Attack?

a) Ransomware b) CyberBullying

c) Responsible Password Management d) Denial of Service (DoS)

https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 1/8
3/18/24, 12:14 AM Cyber Security | Quizizz

6. Which one of the following is NOT a type of CyberSecurity Attack?

a) CyberBullying b) Ransomware

c) Identity Theft d) Keep your system updated

7. Viruses, worms, and trojans are common security threats that are often used in spreading.
What is the name for them all?

a) scams b) passwords

c) malware d) downloads

8. While Trish was playing an online game, a pop-up appeared, prompting her to click on the
flashing lights to receive more points for her game. What should she do?

a) Click the X in the corner of the pop-up to b) Click on the flashing lights.
make it go away.

c) Save the pop-up message until she really d) Turn off the game and the gaming console.
needs extra points to win.

9. Programs that look useful, but cause damage to your computer

a) phishing b) spyware

c) trojans d) worms

10. Fake e-mail message appearing to be from a trusted business, social network or other contact
Asks for personal information or requests a user to click on a link or download a file to verify
personal information Hackers can secretly collect personal information and passwords

a) spyware b) worms

c) phishing d) pharming

11. Malicious code that secretly watches your computer activity and sends the information over
the Internet; can secretly capture your keystrokes (including passwords) and compromise
your identity

a) virus b) spyware

c) worms d) phishing

https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 2/8
3/18/24, 12:14 AM Cyber Security | Quizizz

12. Special types of viruses that can travel from computer to computer without human action;
self-replicating and can multiply until it uses up the computer's resources

a) trojans b) phishing

c) spyware d) worms

13. Cybersecurity is...

a) black hat hackers and white hat hackers b) viruses and trojans

c) the ongoing effort to protect these d) the ongoing effort to attack networked
networked systems and all of the data from systems and all of the data
unauthorized use or harm

14. Company policies should restrict access to the information to authorized personnel and
ensure that only those authorised individuals view this data.

a) Integrity b) Confidentiality

c) Availability

15. Maintaining equipment, performing hardware repairs, keeping operating systems and
software up to date, and creating backups ensure the availability of the network and data to
the authorised users.

a) Confidentiality b) Availability

c) Integrity

16. Data must be unaltered during transit (being sent between people) and not changed by
unauthorised entities.

a) Availability b) Confidentiality

c) Integrity

17. Which type of hacker has permission to hack?

a) Grey Hat b) White Hat

c) Black Hat d) Red Hat

18. Which type of hacker doesn't have permission to hack?

a) Grey Hat b) Black Hat

c) White Hat d) Red Hat

https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 3/8
3/18/24, 12:14 AM Cyber Security | Quizizz

19.

What are the long-term negative effects of identity theft?

a) Inability to access and use your bank b) A poor credit score


account

c) Extremely time consuming to fix the d) You will likely lose your job
problem

20. the verification of


identity based on a person’s unique characteristics
such as facial features, fingerprints, voice, or
retinal scans

a) biometric authentication b) compromised

c) breach

21. A faulty _____ can cause data to become corrupt?

a) Hard disk b) Printer

c) Copier d) Scanner

22. Which of the following is unlikely to damage or delete data?

a) Virus b) Malware

c) System crash d) Archiving

23. Where should backups idealy be kept?

a) On the computer's hard disk b) Near the computer

c) In a folder on the computer's hard disk d) In a separate room or off site

24. What can be done to disks to prevent accidental deletion of data?

a) Store them in their original packaging b) Write protect them

c) Tell your friend not to delete your data d) Only allow access with a user ID and
password

https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 4/8
3/18/24, 12:14 AM Cyber Security | Quizizz

25. In order to restrict access to secure data, a system of _____ should be used?

a) Passwords b) Anti-virus software

c) Multi-user operating system d) Single-user operating system

26. Converting data into a secret code so that it cannot be read by an unauthorised person is
called _____ ?

a) Encryption b) Incription

c) De-encryption d) Prescription

27. Which of the following is NOT a physical precaution to protect data?

a) Security guards b) Security guards

c) Passwords d) Lock the doors

28. _____ indicates a secure connection between your computer and a trusted website?

a) html b) https

c) http d) tcp

29. What's the best way of protecting your computer against viruses

a) Installing anti virus software b) Not letting anyone else use it

c) Make sure it doesn't overheat d) Using a firewall

30. How often should you update anti virus software

a) Once a week b) Twice a day

c) Once a month d) Once a year

31. A computer virus is ...

a) A common cold b) Hardware cold

c) Software code d) A bug

32. A computer virus can

a) Damage your hardware b) Delete the computers memory

c) Give you the flu d) Corrupt your files

https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 5/8
3/18/24, 12:14 AM Cyber Security | Quizizz

33. Which law makes it illegal to share computer viruses

a) The Computer Misuse Act b) The Internet Act

c) The Data Protection Act d) The Virus Act

34. A computer virus can...

a) Infect your television b) Kill your computer

c) Replicate itself d) Overheat

35. Which file type is most likely to contain a virus

a) .jpeg b) .png

c) .exe d) .doc

36. What is the name given to the malware that disguises itself as something useful

a) Spyware b) Trojan

c) Virus d) Keylogger

37. A person who breaks code to gain access to a computer

a) An Employee b) A Spy

c) A Hacker d) A Teacher

38. To measure human characteristic in order to correctly identify an individual

a) Passwords b) Encryption

c) Biometrics d) Locking the door

39. A program or hardware device that filters the data coming through the internet connection

a) Firewall b) Anti-spyware

c) Biometrics d) Anti-virus software

40. Which of the following is the most likely source of a virus

a) A memory stick b) Computer games

c) Someone sneezing on your keyboard d) A government website

https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 6/8
3/18/24, 12:14 AM Cyber Security | Quizizz

Answer Keys

1. a) Antivirus 2. a) Phishing 3. d) Denial of Service (DoS)

4. a) Ransomware 5. c) Responsible Password 6. d) Keep your system


Management updated

7. c) malware 8. a) Click the X in the corner 9. c) trojans


of the pop-up to make it
go away.

10. c) phishing 11. b) spyware 12. d) worms

13. c) the ongoing effort to 14. b) Confidentiality 15. b) Availability


protect these networked
systems and all of the
data from unauthorized
use or harm

16. c) Integrity 17. b) White Hat 18. b) Black Hat

19. b) A , Extremely 20. a) biometric 21. a) Hard disk


poor c) time authentication
credit consuming to
score fix the
problem

22. d) Archiving 23. d) In a separate room or 24. b) Write protect them


off site

25. a) Passwords 26. a) Encryption 27. c) Passwords

28. b) https 29. a) Installing anti virus 30. a) Once a week


software

31. c) Software code 32. d) Corrupt your files 33. a) The Computer Misuse
Act

34. c) Replicate itself 35. c) .exe 36. b) Trojan

37. c) A Hacker 38. c) Biometrics 39. a) Firewall

40. a) A memory stick

https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 7/8
3/18/24, 12:14 AM Cyber Security | Quizizz

https://quizizz.com/print/quiz/5bb12c38dc0f390019121233 8/8

You might also like