Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
14 questions
Show answers
  • Q1
    What is cyber security?
    Ensuring that the government can access everyone online activity
    The techniques of protecting computers and networks unauthorised access or cyber attacks
    When someone attempts to gain unauthorised access or cause damage to a computer or network
    Restricting childrens access to age appropriate web pages and apps
    45s
    3.6.1.a
  • Q2
    What are audit trails used for?
    Ensuring your computer isn't infected by virus
    Maintaining security and for recovering lost data
    Ensuring your computer is secure from white hat hackers
    Ensuring the trail of computer energy flow
    45s
    3.6.1.a
  • Q3
    Why is cyber security becoming more challenging?
    As more information is being held online, there are more areas to exploit
    There is not enough money being invested in cyber security
    There are less people working in cyber secuirty
    The number of hackers are reducing
    45s
    3.6.1.a
  • Q4
    Why are cloud based services targeted for hacking?
    Because they now store so much personal informaiton
    Because you can then access everyone computers
    Because they are easier to hack
    Because these companies make so much money
    45s
    3.6.1.a
  • Q5
    What is a common piece of software that individuals can use to protect their own computer from cyber attacks?
    A firewall
    Anti Virus Software
    Microsoft Office
    Password lock boxes
    45s
    3.6.1.a
  • Q6
    Who is responsible for ensuring Cyber Security in a company?
    Systems Security Manager
    Everyone
    Network Manager
    Employees
    45s
    3.6.1.a
  • Q7
    Which of these can cyber security not protect against?
    Slow hardware performance
    Brute force hacking
    Malware
    Social Engineering
    45s
    3.6.1.a
  • Q8
    What is preventative cyber security?
    Looking for ways to stop cyber attacks happening in the first place
    Deliberately hacking your own network to test its capabilities
    Responding to cyber attacks on a case by case basis
    Ensuring that software in the newest release available
    45s
    3.6.1.a
  • Q9
    What is reactive cyber security?
    Looking for ways to stop cyber attacks happening in the first place
    Deliberately hacking your own network to test its capabilities
    Ensuring that software in the newest release available
    Responding to cyber attacks on a case by case basis
    45s
    3.6.1.a
  • Q10
    Which of these is not a cyber security method?
    Installing anti virus software
    Having an User Acceptance Policy
    Turning off your computer when you leave it
    Restarting your computer regularly to push for updates
    45s
    3.6.1.a
  • Q11
    Why are User Acceptance Policies so important for cyber security?
    They help educate users of the network about how to keep it safe
    To limit the number of users to a network
    So that users of the network know what websites are banned
    So that companies can track users emails and web-usage
    45s
    3.6.1.a
  • Q12
    What did hackers of the Sony PlayStation 2011 attacks release?
    Customers security details, including credit card information
    The records of the lowest scoring players
    Cheat codes for new games coming out
    Employees security details
    45s
    3.6.1.a
  • Q13
    What are the reasons that people will try to hack a network?
    For money
    All of these
    For fun
    For revenge
    45s
    3.6.1.a
  • Q14
    What is considered to be the biggest threat to a network?
    Cheap software
    Using older versions of operating systems
    Slow or old machines
    People themselves
    45s
    3.6.1.a

Teachers give this quiz to your class