
Cyber Security Principles
Quiz by Robert
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1What is the principle of least privilege in cyber security?Every user should have full access to all systemsAccess should be restricted to only administrative usersUsers should be given the minimum levels of access necessary to perform their job functionsAccess levels should be the same for all users30s
- Q2What does the term 'phishing' refer to in cyber security?A way to install antivirus software remotelyA type of firewall protectionA method for encrypting dataA technique used to trick individuals into providing sensitive information30s
- Q3What is the purpose of a firewall in network security?To monitor and control incoming and outgoing network traffic based on predetermined security rulesTo provide internet access to usersTo create backups of data automaticallyTo encrypt sensitive data during transmission30s
- Q4What is two-factor authentication (2FA)?A password that is changed every monthA method of using only a username and passwordAn encryption technique used for data storageA security process that requires two different forms of verification to access an account30s
- Q5What does the term 'malware' refer to?Applications that promote user productivityPrograms used for data backupSoftware that enhances computer performanceSoftware designed to disrupt, damage, or gain unauthorized access to computer systems30s
- Q6What is the primary purpose of regular software updates?To change the user interface designTo increase the speed of the computerTo delete unnecessary filesTo fix vulnerabilities and improve security30s
- Q7What is social engineering in cyber security?Manipulating individuals into revealing confidential informationA process for physically securing a buildingA technique used to analyze network trafficThe method of creating strong passwords30s
- Q8What is encryption in the context of cyber security?A method of deleting files from a computerThe process of converting information into a code to prevent unauthorized accessThe storage of data in plain text formatThe act of sharing data freely over the internet30s
- Q9What is a DDoS attack?A method for securing data transmissionsA technique for improving website performanceA form of data encryptionA malicious attempt to disrupt the normal functioning of a targeted server, service, or network30s
- Q10What does 'backup' mean in cyber security?Creating copies of data to prevent loss in case of failure or attackThe process of speeding up a computer's performanceA method for sharing files onlineA technique to permanently delete files30s