Cyber Security basics
Quiz by Ramjeet Padhan
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1What is the purpose of a firewall?To protect against physical theft of devicesTo encrypt files on a computerTo scan for viruses and malwareTo monitor and control incoming and outgoing network traffic30s
- Q2What is the best practice for creating secure passwords?Using a password that is easy to rememberUsing a single word as the passwordUsing a combination of uppercase and lowercase letters, numbers, and symbolsUsing personal information like birthdays or names30s
- Q3What is phishing?A type of computer virusThe process of encrypting dataA technique to secure network connectionsA fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity30s
- Q4What is two-factor authentication?An additional layer of security that requires a second form of verificationA technique to detect malwareA type of firewallA method to encrypt data30s
- Q5What is a common type of social engineering attack?PhishingFirewallEncryptionMalware30s
- Q6What is the purpose of antivirus software?To monitor network trafficTo detect, prevent, and remove malicious software from a computerTo protect against physical theft of devicesTo encrypt files on a computer30s
- Q7What is the importance of regular software updates?To install new software applicationsTo create backups of dataTo patch security vulnerabilities and improve overall system performanceTo increase storage capacity30s
- Q8What is the concept of least privilege in cyber security?Providing users with only the necessary permissions and access rights to perform their tasksRestricting all users from accessing any resourcesGranting all users administrative privilegesProviding users with unlimited permissions and access rights30s
- Q9What is a common type of malware that encrypts files and demands a ransom for decryption?RansomwareAdwareTrojan HorseSpyware30s
- Q10What is the purpose of a VPN (Virtual Private Network)?To store and backup dataTo create a secure and encrypted connection over a public network, such as the internetTo block access to websitesTo scan for viruses and malware30s