placeholder image to represent content

Cyber Security Quiz

Quiz by Yashaswini B M

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
30 questions
Show answers
  • Q1
    In which of the following, a person is constantly followed/chased by another person or group of several peoples?
    Stalking
    Phishing
    Bulling
    Identity theft
    30s
  • Q2
    Which one of the following can be considered as the class of computer threats?
    Both A and C
    Dos Attack
    Soliciting
    Phishing
    30s
  • Q3
    Which of the following is considered as the unsolicited commercial email?
    All of the above
    Virus
    Spam
    Malware
    30s
  • Q4
    Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
    All of the above
    Spyware
    Malware
    Adware
    30s
  • Q5
    Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
    Cyber low
    Cybersecurity
    Cybersafety
    Cyberethics
    30s
  • Q6
    Which one of the following refers to the technique used for verifying the integrity of the message?
    Message Digest
    Decryption algorithm
    Protocol
    Digital signature
    30s
  • Q7
    In system hacking, which of the following is the most crucial activity?
    Covering tracks
    Cracking passwords
    None of the above
    Information gathering
    30s
  • Q8
    To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
    Script
    Vlc player
    Firewall
    Antivirus
    30s
  • Q9
    In the computer networks, the encryption techniques are primarily used for improving the ________
    Longevity
    Performance
    Reliability
    Security
    30s
  • Q10
    Which of the following statements is true about the Trojans?
    Trojans do nothing harmful to the user's computer systems
    None of the above
    Trojans replicates them self's or clone them self's through an infections
    Trojans perform tasks for which they are designed or programmed
    30s
  • Q11
    A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
    Buffer-overflow
    Phishing
    MiTM
    Clickjacking
    30s
  • Q12
    Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
    ip tracker
    web pages
    emails
    websites
    30s
  • Q13
    What is the name of the IT law that India is having in the Indian legislature?
    India’s Digital Information Technology (DIT) Act, 2000
    The Technology Act, 2008
    India’s Information Technology (IT) Act, 2000
    India’s Technology (IT) Act, 2000
    30s
  • Q14
    What is the full form of ITA-2000?
    International Technology Act -2000
    Indian Technology Act -2000
    Information Tech Act -2000
    Information Technology Act -2000
    30s
  • Q15
    What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?
    6 months of imprisonment and a fine of Rs. 50,000
    2 years of imprisonment and a fine of Rs. 250,000
    3 years of imprisonment and a fine of Rs. 500,000
    1 year of imprisonment and a fine of Rs. 100,000
    30s

Teachers give this quiz to your class