
Cybersecurity
Quiz by Siti Zulfa Nur Rahma
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
6 questions
Show answers
- Q1
Which of the statements correctly describes cybersecurity?
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from crimes that happen only in cyberspace
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks
Cybersecurity is the ongoing effort to protect computers, networks and data from malicious attacks
30s - Q2What does the term 'phishing' refer to in cybersecurity?A type of software updateA method of encrypting dataA technique for speeding up network connectionsA fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity30s
- Q3Which of the following is a common sign of a malware infection?Increased battery lifeEnhanced graphics performanceNew applications automatically installing updatesUnexplained slow performance of your computer30s
- Q4What is ransomware?A tool for managing passwords securelyA type of malicious software that encrypts a user's files and demands payment for the decryption keyA program for optimizing computer performanceSoftware that protects against viruses30s
- Q5What does the term 'zero-day vulnerability' refer to in cybersecurity?A public announcement about software security fixesA scheduled update to fix bugsA flaw in software that is unknown to the vendor and has not yet been patchedA type of backup system for data30s
- Q6What is the function of two-factor authentication (2FA)?To add an extra layer of security beyond just a passwordTo only allow access from specific IP addressesTo automatically back up data to the cloudTo eliminate the need for passwords30s