placeholder image to represent content

Cyber Quiz

Quiz by PhilipK

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
12 questions
Show answers
  • Q1
    If Sam has been convicted for an act of hacking into a computer server at a public hospital in Singapore, and that led to a loss of all data of all its patients, the maximum punishment he can expect to receive is __________.
    a fine not exceeding $100,000, imprisonment to a term not exceeding 20 years, or to both
    a fine not exceeding $5,000, imprisonment to a term not exceeding 2 years, or to both
    a fine not exceeding $50,000, imprisonment to a term not exceeding 7 years, or to both
    a fine not exceeding $10,000, imprisonment to a term not exceeding 3 years, or to both
    30s
  • Q2
    Beh was angry with MobileAir for refusing to refund $1,000 for the return of a defective iPhone 6. Beh then sent 2,500 emails to MobileAir demanding that they make good the refund. The multiple emails caused MobileAir's email server to breakdown, resulting in a loss of business that cost the firm more than $15,000. Beh was charged in court for this criminal act. What would be the maximum punishment Beh would expect to receive?
    Fine not exceeding $100,000, jail term not exceeding 20 years, or to both.
    Fine not exceeding $10,000, jail term not exceeding 3 years, or to both
    Fine not exceeding $20,000, jail term not exceeding 5 years, or to both
    Fine not exceeding $50,000, jail term not exceeding 7 years, or to both.
    30s
  • Q3
    Which offence(s) under the Computer Misuse and Cybersecurity Act has the element "knowingly"?
    applicable to all offences under Computer Misuse and Cybersecurity Act.
    Section 3, 6 and 7
    Section 3, 5, 6, 7 and 8
    Section 3, 6, 7 and 8
    30s
  • Q4
    A person hired to break into a computer to steal information is a _____.
    computer spy
    gray hat hacker
    cyberterrorist
    Script kiddy
    30s
  • Q5
    A device or application that analyses whole packets, both header and payload, looking for known events. When a known event is detected a log message is generated detailing the event.
    DMZ
    Intrusion Detection System
    Intrusion Prevention System
    Firewall
    30s
  • Q6
    The 3 types of information protection, often called CIA, are _____.
    Consistency, Integrity and Accessibility
    Confidentiality, Integrity and Availability
    Consistency, Intelligence and Availability
    Correctness, Integrity and Accuraccy
    30s
  • Q7
    _____ hackers' goal is malicious and destructive.
    Black hat
    Gray hat
    White hat
    Transparent hat
    30s
  • Q8
    ____ layer has the plans and policies establised by an organisation to ensure that people correctly use the products
    People
    Tecnhnology
    Products
    Procedures
    30s
  • Q9
    A cumulative package of all security updates plus additional features is called ______.
    hotfix
    service pack
    security patch
    critical update
    30s
  • Q10
    Casually observing user entering keypad code is called _____
    shoulder surfing
    tailgating
    dumpster diving
    hoaxes
    30s
  • Q11
    ______ attack involve the man-in-the-middle capturing login credentials between the computer and the server, and reusing it later to access the server illegally.
    Replay
    Trojan
    DoS
    Spoofing
    30s
  • Q12
    ______ exploits application or operating system vulnerability and sends copies of itself to other network devices.
    Rootkits
    Trojans
    Viruses
    Worms
    30s

Teachers give this quiz to your class