0% found this document useful (0 votes)
29 views28 pages

Choice

The document contains a cybersecurity quiz with multiple choice questions about topics such as passwords, encryption, malware, social engineering, and data security best practices. It tests knowledge of important cybersecurity concepts and threats.

Uploaded by

Mark Turai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views28 pages

Choice

The document contains a cybersecurity quiz with multiple choice questions about topics such as passwords, encryption, malware, social engineering, and data security best practices. It tests knowledge of important cybersecurity concepts and threats.

Uploaded by

Mark Turai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Cybersecurity Quiz

1
Easy

Yes or No ?
Please read me so that
40 everybody can hear me

Cybersecurity Quiz

1
Easy

Yes or No ?
Please read me so that
40 everybody can hear me
Cybersecurity Quiz

2
easy+

Choice
40 Please read me so that
everybody can hear me

Cybersecurity Quiz

2
easy+

Choice
Please read me so that
everybody can hear me
40
Cybersecurity Quiz

3
medium

Choice
Please read me so that
40 everybody can hear me

Cybersecurity Quiz

3
medium

Choice
Please read me so that
40 everybody can hear me
Cybersecurity Quiz

4
hard

Choice
Please read me so that
everybody can hear me
40

Cybersecurity Quiz

4hard

Choice
Please read me so that
everybody can hear me
40
Why is it important to stay up to date with
cybersecurity training?(2)

a)Because the cybersecurity landscape is


constantly chaning, and hackers are always
finding new ways to attack

b)Because its important for someone who uses IT


systems to know all their vulnerabilities

c)Because it takes workload off of the


cybersecurity team

An attack in which a hacker tries to trick the


employee of a company through an email into doing
something unsafe:(2)

a)Ransomware

b)Ransomware

c)Spyware
Why is two-factor authentication recommended?
(2)

a)Because it adds an extra layer of security

b)Because it allows you to use weak passwords


and still be safe

c)Because its better than remembering a very long


password

What is a clear sign of a phishing email?(2)

a)Typo in the sender's signature

b)Close but not quite the same domain name in the


sender's address (e.g @micrasoft.com vs
@microsoft.com)

c)It contains a link that goes to a sharepoint site


Why should different passwords be used for
different online services?(2)

a)Because different passwords are harder to


guess by attackers

b)Because if your password gets hacked on one


service, it won't affect the security of your
account on other services

c)Becase having to think of different passwords


each time forces you to create stronger passwords

What makes a long and complex password more


secure than a short and simple one?(2)

a)The larger number of different possibilities that


an attacker would have to guess through in order
to break it

b)The length of time if would take for an atacker


to write down the password

c)They are more difficult to remember and re-use


by hackers
What is social engineering?(2)

a)A highly technical hacking attempt to breach a


company's IT systems

b)A method of manipulating people to gain


unauthorized access to information

c)A person impersonating someone from a trusted


organization, in order to deceive them into voting
or thinking a certain way

What is the most common type of cyber attack?


(2)

a) Denial-of-Service (DDoS) attack

b) Phishing attack

c) Ransomware attack

d) Social engineering attack


What is the purpose of antivirus software?(2)

a) To protect against physical damage to a


computer

b) To prevent unauthorized access to a network

c) To scan for and remove malicious software

d) To encrypt sensitive data

What is encryption?(2)

a) A method of hiding physical objects

b) A process of converting data into a secret code

c) A way to protect against malware attacks


What is a vulnerability?(2)

a) A type of antivirus software

b) A weakness in a computer system that can be


exploited by attackers

c) A method of securing wireless networks

What is a data backup?(2)

a) A physical break-in at a data center

b) A situation where data is accidentally deleted

c) An unauthorized access to sensitive information

d) A process of creating copies of data to protect


against data loss
What is the best practice for securing sensitive
data?(2)

a) Storing it on a public server

b) Sharing it with colleagues via email

c) Encrypting it before storage or transmission

d) Using weak passwords for easy access

What is the purpose of a password manager?(2)

a) To store passwords securely

b) To encrypt network traffic

c) To detect malware

d) To optimize internet speed


_______ is a security measure that involves
using multiple authentication factors to verify a
user's identity.(2)

a) Firewall

b) VPN

c) Two-factor authentication (2FA)

d) Biometric authentication

_______ is a security measure that involves


creating a copy of data to protect against loss or
damage.(2)

a) Firewall

b) VPN

c) Two-factor authentication (2FA)

d) Data backup
_______ is a type of malware that spreads by
making copies of itself and infecting other files
or systems.(2)

a) Spyware

b) Ransomware

c) Trojan

d) Virus

_______ is a type of attack where an attacker


gains unauthorized access to a computer system
by guessing a user's password using a premade
list of possible passwords.(2)

a) Phishing

b) Malware

c) Encryption

d) Password cracking
What does the term "malware" refer to?(2)

a) Software that protects against viruses

b) Software that monitors network traffic

c) Software that steals sensitive information

d) Software that does something malicious

Why are strong passwords needed for a secure


use of IT systems?(2)

a)Because they are harder to remember

b)Because they are harder to break

c)Because they help improve the user's typing


skills
What represents a strong password:(2)

a.14 character long string of random letters

b.14 character long string of random letters and


numbers

c.14 character long string of random letters,


numbers and symbols
Should you use different passwords for different
online services? (1)

a)Yes
b)No

Are public Wifi networks less secure than private


ones?(1)

a)Yes
b)No
Can antivirus software protect against all types
of malware? (1)

a)Yes
b)No

Is it possible for a computer to be infected with


malware without the user's knowledge?(1)

a)Yes
b)No
Is it advisable to share your passwords with
others? (1)

a)Yes
b)No

Can social engineering attacks exploit human


psychology to gain unauthorized access to
information?(1)

a)Yes
b)No
Is it safe to install software or apps from
untrusted sources? (1)

a)Yes
b)No

Can encryption protect sensitive data from


unauthorized access?(1)

a)Yes
b)No
Can regular data backups help protect against
data loss in case of a cyber attack or hardware
failure? (1)

a)Yes
b)No

Is it safe to leave your computer unattended


without locking it?(1)

a)Yes
b)No
What is the purpose of regular software
updates? (3)

a)Each new version makes the system perform


better

b)Updates add new features that are desired by


end users

c)Patches often fix security vulnerabilities


discovered in the system

What is a ransomware attack?(3)

a)An attack in which hackers render a person's or


company's data unusable by encrypting it, then
asking for money in exchanhge for decrypting it)

b)An attack in which a hacker asks for money in


exchange for not infecting a person's computer
with malware

c)An attack in which a hacker steals all the data of


a person or company and leaks it online for
everyone to see
What is the purpose of a firewall? (3)

a) To protect against physical theft

b) To prevent unauthorized access to a network

c) To encrypt data during transmission

d) To scan for viruses on a computer

What is a VPN?(3)

a) A virtual private network used for secure


communication

b) A type of computer virus that spies on all


network traffic

c) A method of encrypting emails


What is the main goal of a DDoS (Distributed
Denial of Service) attack? (3)

a) To steal sensitive information

b) To gain unauthorized access

c) To overload a network or website

d) To encrypt network traffic

_______ is a security measure that involves


verifying the identity of a user or device before
granting access to a computer system or
network)(3)

a) Firewall

b) VPN

c) Authentication

d) Intrusion Detection System (IDS)


_______ is a type of attack where an attacker
sends a malicious email that appears to be from
a trusted source in order to trick the recipient
into revealing sensitive information) (3)

a) Phishing

b) Ransomware

c) Social engineering

d) Spear phishing

What is the purpose of encryption in


cybersecurity?(3)

a) To hide network traffic

b) To prevent unauthorized access

c) To speed up data transmission

d) To protect data confidentialit


What is the primary purpose of a security patch?
(3)

a) To prevent phishing attacks

b) To encrypt network data

c) To fix software vulnerabilities

d) To detect and remove malware


_______ is a type of attack where an attacker
sends a large amount of traffic to a target
system, causing it to become overwhelmed and
unavailable) (4)

a) Phishing

b) Ransomware

c) Social engineering

d) Denial of Service (DoS)

A _______ is a program that appears legitimate


but actually performs malicious activities on a
computer system)(4)

a) Firewall

b) VPN

c) Trojan horse

d) Brute force attack


_______ is the process of converting plaintext
into ciphertext to protect sensitive information
from unauthorized access) (4)

a) Phishing

b) Malware

c) Encryption

d) CAPTCHA

_______ is a security measure that involves


monitoring and analyzing events occurring
within a computer system or network to detect
and respond to potential security incidents)(4)

a) Firewall

b) VPN

c) Intrusion Detection System (IDS)

d) Biometric authentication
_______ is a technique used by attackers to gain
unauthorized access to a computer system by
intercepting wireless network traffic) (4)

a) Phishing

b) Malware

c) Encryption

d) Wi-Fi eavesdropping

_______ is a technique used by attackers to gain


unauthorized access to a computer system by
impersonating a legitimate website or service)
(4)

a) Phishing

b) Malware

c) Encryption

d) Spoofing

You might also like