
SECURITY plus cybersecurity
Quiz by Dwayne Abuel
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
59 questions
Show answers
- Q1What is a common method cybercriminals use to gain unauthorized access to a computer network?PhishingEncryptionFirewallAntivirus30s
- Q2What is a type of malicious software that can block access to a computer system until a ransom is paid?SpywareAdwareMalwareRansomware30s
- Q3Which of the following is a physical security measure that can help protect information in a workplace?Username and passwordBiometric scannersFirewallEncryption30s
- Q4What is a strategy that can help protect your online accounts from unauthorized access?Writing passwords on sticky notesSharing passwords with friendsUsing strong, unique passwordsUsing the same password for multiple accounts30s
- Q5What is a practice that can help keep your computer safe from malware and viruses?Downloading files from untrustworthy websitesDisabling the firewallClicking on unknown email linksRegularly updating your antivirus software30s
- Q6What is a method cybercriminals use to trick individuals into downloading malicious software by disguising it as legitimate software?Network segmentationTwo-factor authenticationData encryptionSocial engineering30s
- Q7What is the process of converting data into a code to prevent unauthorized access called?PhishingEncryptionFirewallMalware30s
- Q8What is a technique used to protect sensitive information as it travels across a network by creating a secure 'tunnel'?RouterCookieVPN (Virtual Private Network)Spam filter30s
- Q9What is a type of cyber attack that involves overwhelming a system with an excessive amount of traffic, causing it to become slow or unresponsive?SQL injection attackDDoS (Distributed Denial of Service) attackPhishing attackMalware attack30s
- Q10What is a method of authenticating a user's identity by confirming something they know, something they have, or something they are?Network monitoringFirewall protectionData encryptionTwo-factor authentication30s
- Q11What is a common method cybercriminals use to gain access to a computer system?PhishingFirewallBiometricsEncryption30s
- Q12What is a type of software that can protect a computer system from malware and viruses?FirewallSpamBrowserAntivirus30s
- Q13What is the practice of tricking people into giving out confidential information such as passwords or credit card numbers?Intrusion DetectionSocial engineeringPatch ManagementDenial of Service30s
- Q14What is the term for a malicious program that demands payment from the victim in exchange for restoring access to their files or device?EncryptionPhishingRansomwareFirewall30s
- Q15What is the term for the practice of intentionally disclosing confidential information in a public forum?RansomwareData leakageTwo-factor authenticationSpyware30s