Cybersecurity
Quiz by Michael Orhewere
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
42 questions
Show answers
- Q1What is a common method used by hackers to steal sensitive information such as passwords or credit card details?PhishingAntivirusFirewallEncryption30s
- Q2What is a software program designed to prevent unauthorized access to or from a private network?FirewallMalwareSpywarePhishing30s
- Q3What is a type of malicious software designed to secretly access a computer system without the owner's knowledge?FirewallSpywarePhishingEncryption30s
- Q4Which of the following is a recommended way to create strong and secure passwords?Using a combination of letters, numbers, and special charactersSharing passwords with othersUsing the same password for multiple accountsUsing only common words or phrases30s
- Q5What is the practice of tricking individuals into providing sensitive information by pretending to be a trustworthy entity?PhishingEncryptionMalwareFirewall30s
- Q6What is a common practice to protect your personal information while using public Wi-Fi networks?Disabling the device's firewallIgnoring software updatesUsing a virtual private network (VPN)Sharing personal information openly30s
- Q7What is a common method used by hackers to gain unauthorized access to a computer system?Brute force attackFirewall protectionData encryptionTwo-factor authentication30s
- Q8What is a common cyber threat that involves tricking users into installing malicious software by pretending to be a legitimate program?PhishingMalwareEncryptionFirewall30s
- Q9What is the term used to describe the practice of securing data by converting it into a code that can only be deciphered with the correct key or password?EncryptionFirewallMalwarePhishing30s
- Q10What is the term used to describe the unauthorized practice of gaining access to computer systems with the intent to steal, delete, or modify data?EncryptionHackingSpywareFirewall30s
- Q11What is a common method used by cybercriminals to gain unauthorized access to computers or networks?Anti-virus softwarePhishingEncryptionFirewall30s
- Q12Which of the following is a recommendation to enhance cybersecurity?Sharing passwords with friendsUsing the same password for multiple accountsWriting passwords on sticky notesUsing complex and unique passwords for each account30s
- Q13What does the acronym 'DDoS' stand for in the context of cybersecurity?Digital Defense Operating SystemData Deletion Over StorageDistributed Denial of ServiceDirect Detection of Threats30s
- Q14What is malware in the context of cybersecurity?A type of hardware used for cybersecurity purposesMalicious software designed to damage or infiltrate a computer systemA type of encrypted communication protocolA security feature that blocks hackers30s
- Q15What is a VPN used for in the context of cybersecurity?To delete unnecessary files from a computerTo install software updates on devicesTo create a secure and encrypted connection over a networkTo share files with friends on social media30s