![placeholder image to represent content](/_next/image?url=%2Fassets%2Fquiz_default_logo.jpg&w=256&q=75)
Cyber Quiz
Quiz by PhilipK
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
12 questions
Show answers
- Q1If Sam has been convicted for an act of hacking into a computer server at a public hospital in Singapore, and that led to a loss of all data of all its patients, the maximum punishment he can expect to receive is __________.a fine not exceeding $100,000, imprisonment to a term not exceeding 20 years, or to botha fine not exceeding $5,000, imprisonment to a term not exceeding 2 years, or to botha fine not exceeding $50,000, imprisonment to a term not exceeding 7 years, or to botha fine not exceeding $10,000, imprisonment to a term not exceeding 3 years, or to both30s
- Q2Beh was angry with MobileAir for refusing to refund $1,000 for the return of a defective iPhone 6. Beh then sent 2,500 emails to MobileAir demanding that they make good the refund. The multiple emails caused MobileAir's email server to breakdown, resulting in a loss of business that cost the firm more than $15,000. Beh was charged in court for this criminal act. What would be the maximum punishment Beh would expect to receive?Fine not exceeding $100,000, jail term not exceeding 20 years, or to both.Fine not exceeding $10,000, jail term not exceeding 3 years, or to bothFine not exceeding $20,000, jail term not exceeding 5 years, or to bothFine not exceeding $50,000, jail term not exceeding 7 years, or to both.30s
- Q3Which offence(s) under the Computer Misuse and Cybersecurity Act has the element "knowingly"?applicable to all offences under Computer Misuse and Cybersecurity Act.Section 3, 6 and 7Section 3, 5, 6, 7 and 8Section 3, 6, 7 and 830s
- Q4A person hired to break into a computer to steal information is a _____.computer spygray hat hackercyberterroristScript kiddy30s
- Q5A device or application that analyses whole packets, both header and payload, looking for known events. When a known event is detected a log message is generated detailing the event.DMZIntrusion Detection SystemIntrusion Prevention SystemFirewall30s
- Q6The 3 types of information protection, often called CIA, are _____.Consistency, Integrity and AccessibilityConfidentiality, Integrity and AvailabilityConsistency, Intelligence and AvailabilityCorrectness, Integrity and Accuraccy30s
- Q7_____ hackers' goal is malicious and destructive.Black hatGray hatWhite hatTransparent hat30s
- Q8____ layer has the plans and policies establised by an organisation to ensure that people correctly use the productsPeopleTecnhnologyProductsProcedures30s
- Q9A cumulative package of all security updates plus additional features is called ______.hotfixservice packsecurity patchcritical update30s
- Q10Casually observing user entering keypad code is called _____shoulder surfingtailgatingdumpster divinghoaxes30s
- Q11______ attack involve the man-in-the-middle capturing login credentials between the computer and the server, and reusing it later to access the server illegally.ReplayTrojanDoSSpoofing30s
- Q12______ exploits application or operating system vulnerability and sends copies of itself to other network devices.RootkitsTrojansVirusesWorms30s