
Cyber space
Quiz by Dr S Kavitha GRGSMS
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
8 questions
Show answers
- Q1What term is used to describe unauthorized access or use of electronic data?SpoofingMalwarePhishingHacking30s
- Q2What is the process of protecting computer systems from unauthorized access or damage?EncryptionFirewallSpywareAntivirus30s
- Q3Which of the following is an example of a strong password?abcd1234password123P@ssw0rd!1234567830s
- Q4What is the term used for the practice of tricking individuals into revealing sensitive information?MalwareSpoofingHackingPhishing30s
- Q5What is the term used for the practice of gaining unauthorized access to a wireless network?SpoofingMalwarePhishingWi-Fi hacking30s
- Q6What is the term used for a type of malicious software that encrypts files on a computer and demands a ransom for their release?MalwarePhishingSpywareRansomware30s
- Q7What is the term used to describe a program or code that can automatically spread and infect other computers or networks by exploiting vulnerabilities?BotnetZero-day exploitTrojan horseWorm30s
- Q8Which of the following statements best defines cybersecurity?The practice of protecting computer systems, networks, and data from digital attacks.Using social media to connect with friends and family.The study of online advertising techniques.The process of optimizing website rankings on search engines.30s