placeholder image to represent content

SECURITY plus cybersecurity

Quiz by Dwayne Abuel

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
59 questions
Show answers
  • Q1
    What is a common method cybercriminals use to gain unauthorized access to a computer network?
    Phishing
    Encryption
    Firewall
    Antivirus
    30s
  • Q2
    What is a type of malicious software that can block access to a computer system until a ransom is paid?
    Spyware
    Adware
    Malware
    Ransomware
    30s
  • Q3
    Which of the following is a physical security measure that can help protect information in a workplace?
    Username and password
    Biometric scanners
    Firewall
    Encryption
    30s
  • Q4
    What is a strategy that can help protect your online accounts from unauthorized access?
    Writing passwords on sticky notes
    Sharing passwords with friends
    Using strong, unique passwords
    Using the same password for multiple accounts
    30s
  • Q5
    What is a practice that can help keep your computer safe from malware and viruses?
    Downloading files from untrustworthy websites
    Disabling the firewall
    Clicking on unknown email links
    Regularly updating your antivirus software
    30s
  • Q6
    What is a method cybercriminals use to trick individuals into downloading malicious software by disguising it as legitimate software?
    Network segmentation
    Two-factor authentication
    Data encryption
    Social engineering
    30s
  • Q7
    What is the process of converting data into a code to prevent unauthorized access called?
    Phishing
    Encryption
    Firewall
    Malware
    30s
  • Q8
    What is a technique used to protect sensitive information as it travels across a network by creating a secure 'tunnel'?
    Router
    Cookie
    VPN (Virtual Private Network)
    Spam filter
    30s
  • Q9
    What is a type of cyber attack that involves overwhelming a system with an excessive amount of traffic, causing it to become slow or unresponsive?
    SQL injection attack
    DDoS (Distributed Denial of Service) attack
    Phishing attack
    Malware attack
    30s
  • Q10
    What is a method of authenticating a user's identity by confirming something they know, something they have, or something they are?
    Network monitoring
    Firewall protection
    Data encryption
    Two-factor authentication
    30s
  • Q11
    What is a common method cybercriminals use to gain access to a computer system?
    Phishing
    Firewall
    Biometrics
    Encryption
    30s
  • Q12
    What is a type of software that can protect a computer system from malware and viruses?
    Firewall
    Spam
    Browser
    Antivirus
    30s
  • Q13
    What is the practice of tricking people into giving out confidential information such as passwords or credit card numbers?
    Intrusion Detection
    Social engineering
    Patch Management
    Denial of Service
    30s
  • Q14
    What is the term for a malicious program that demands payment from the victim in exchange for restoring access to their files or device?
    Encryption
    Phishing
    Ransomware
    Firewall
    30s
  • Q15
    What is the term for the practice of intentionally disclosing confidential information in a public forum?
    Ransomware
    Data leakage
    Two-factor authentication
    Spyware
    30s

Teachers give this quiz to your class