Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
14 questions
Show answers
  • Q1
    What term describes the body of technologies, processes, and practices designed to protect networks, any cyber threats?
    Cyber Attacking
    Penetration testing
    Cyber Security
    White hat hacking
    45s
    3.6.1.b
  • Q2
    What is Social Engineering?
    The engineering of social media traffic in order to influence your social media followers
    The art of manipulating or ‘conning’ individuals into giving away private information
    The process of exchanging each others social media information online
    The art of using social events to grow your network
    45s
    3.6.1.b
  • Q3
    Which of the following is not an example of social engineering?
    Hacking
    Phishing
    Shoulder surfing
    Vishing
    45s
    3.6.1.b
  • Q4
    A strong password is one which has?
    Something that is easy to guess in case you forget.
    Something unique and personal to you
    More than 10 characters and a mixture of symbols
    Something easy to remember like your date of birth
    45s
    3.6.1.b
  • Q5
    John is creating a password. Which of the following is a strong password for John?
    Nhoj321
    Jx1N47k#&)
    JonnyBoy675
    John123
    45s
    3.6.1.b
  • Q6
    What are access rights?
    When users are given their rights in accordance to the networking society
    When users are given their usernames and passwords on a network
    When users are given different degrees of access in a network depending on their needs
    When users have access to all things on the network
    45s
    3.6.1.b
  • Q7
    Why are access rights are necessary in order to have a secure network?
    They ensure that everyone can access the files they need
    They make it easier for people to download software
    They ensure that users have access to only what is necessary for themselves
    They make it harder for people to use the web without permisson
    45s
    3.6.1.b
  • Q8
    Default passwords need to be changed because?
    They don't need to be changed
    They are generic and easy to guess
    Because they get boring after while
    Because they expire after one year
    45s
    3.6.1.b
  • Q9
    Which of these is not an example of removable media?
    DVD
    USB Flash Drive
    Mobile Phone
    Hard Drive
    45s
    3.6.1.b
  • Q10
    Removable media poses infection from viruses as a threat and the following threat?
    Data loss and/or theft
    Effecting the number of nodes on your network
    Damaging the flash memory of your computer
    45s
    3.6.1.b
  • Q11
    Why have most organisations now banned the use of removable media?
    It means staff have to use the company storage
    It is impossible to control the upload of content onto the network
    Is means people can not take files off the network
    It stops people from charging personal devices at work
    45s
    3.6.1.b
  • Q12
    What is meant by unpatched software?
    A prototype software that is released early
    Software that has not been updated
    Software that is not fully installed
    Software with a virus installed
    45s
    3.6.1.b
  • Q13
    What does it mean to send out patches?
    Patches make the application more visually pleasing
    Software manufacturers send out updated code to tackle security flaws
    Software manufacturers send out new software to replace the old one
    Patches hide viruses and stop them spreading
    45s
    3.6.1.b
  • Q14
    Software needs to be up to date at all times to ensure safety because?
    This makes sure that the software can't be exploited by anyone for example hackers
    Up to date software is worth more if you want to re-sell your software.
    Up to date software is more fashionable given nobody likes to have to old things
    Hackers will not try and hack newly updated software
    45s
    3.6.1.b

Teachers give this quiz to your class