
Cyber Security Quiz
Quiz by Yashaswini B M
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
30 questions
Show answers
- Q1In which of the following, a person is constantly followed/chased by another person or group of several peoples?StalkingPhishingBullingIdentity theft30s
- Q2Which one of the following can be considered as the class of computer threats?Both A and CDos AttackSolicitingPhishing30s
- Q3Which of the following is considered as the unsolicited commercial email?All of the aboveVirusSpamMalware30s
- Q4Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?All of the aboveSpywareMalwareAdware30s
- Q5Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?Cyber lowCybersecurityCybersafetyCyberethics30s
- Q6Which one of the following refers to the technique used for verifying the integrity of the message?Message DigestDecryption algorithmProtocolDigital signature30s
- Q7In system hacking, which of the following is the most crucial activity?Covering tracksCracking passwordsNone of the aboveInformation gathering30s
- Q8To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.ScriptVlc playerFirewallAntivirus30s
- Q9In the computer networks, the encryption techniques are primarily used for improving the ________LongevityPerformanceReliabilitySecurity30s
- Q10Which of the following statements is true about the Trojans?Trojans do nothing harmful to the user's computer systemsNone of the aboveTrojans replicates them self's or clone them self's through an infectionsTrojans perform tasks for which they are designed or programmed30s
- Q11A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?Buffer-overflowPhishingMiTMClickjacking30s
- Q12Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?ip trackerweb pagesemailswebsites30s
- Q13What is the name of the IT law that India is having in the Indian legislature?India’s Digital Information Technology (DIT) Act, 2000The Technology Act, 2008India’s Information Technology (IT) Act, 2000India’s Technology (IT) Act, 200030s
- Q14What is the full form of ITA-2000?International Technology Act -2000Indian Technology Act -2000Information Tech Act -2000Information Technology Act -200030s
- Q15What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?6 months of imprisonment and a fine of Rs. 50,0002 years of imprisonment and a fine of Rs. 250,0003 years of imprisonment and a fine of Rs. 500,0001 year of imprisonment and a fine of Rs. 100,00030s