Cybersecurity Quiz
1
Easy
Yes or No ?
Please read me so that
40 everybody can hear me
Cybersecurity Quiz
1
Easy
Yes or No ?
Please read me so that
40 everybody can hear me
Cybersecurity Quiz
2
easy+
Choice
40 Please read me so that
everybody can hear me
Cybersecurity Quiz
2
easy+
Choice
Please read me so that
everybody can hear me
40
Cybersecurity Quiz
3
medium
Choice
Please read me so that
40 everybody can hear me
Cybersecurity Quiz
3
medium
Choice
Please read me so that
40 everybody can hear me
Cybersecurity Quiz
4
hard
Choice
Please read me so that
everybody can hear me
40
Cybersecurity Quiz
4hard
Choice
Please read me so that
everybody can hear me
40
Why is it important to stay up to date with
cybersecurity training?(2)
a)Because the cybersecurity landscape is
constantly chaning, and hackers are always
finding new ways to attack
b)Because its important for someone who uses IT
systems to know all their vulnerabilities
c)Because it takes workload off of the
cybersecurity team
An attack in which a hacker tries to trick the
employee of a company through an email into doing
something unsafe:(2)
a)Ransomware
b)Ransomware
c)Spyware
Why is two-factor authentication recommended?
(2)
a)Because it adds an extra layer of security
b)Because it allows you to use weak passwords
and still be safe
c)Because its better than remembering a very long
password
What is a clear sign of a phishing email?(2)
a)Typo in the sender's signature
b)Close but not quite the same domain name in the
sender's address (e.g @micrasoft.com vs
@microsoft.com)
c)It contains a link that goes to a sharepoint site
Why should different passwords be used for
different online services?(2)
a)Because different passwords are harder to
guess by attackers
b)Because if your password gets hacked on one
service, it won't affect the security of your
account on other services
c)Becase having to think of different passwords
each time forces you to create stronger passwords
What makes a long and complex password more
secure than a short and simple one?(2)
a)The larger number of different possibilities that
an attacker would have to guess through in order
to break it
b)The length of time if would take for an atacker
to write down the password
c)They are more difficult to remember and re-use
by hackers
What is social engineering?(2)
a)A highly technical hacking attempt to breach a
company's IT systems
b)A method of manipulating people to gain
unauthorized access to information
c)A person impersonating someone from a trusted
organization, in order to deceive them into voting
or thinking a certain way
What is the most common type of cyber attack?
(2)
a) Denial-of-Service (DDoS) attack
b) Phishing attack
c) Ransomware attack
d) Social engineering attack
What is the purpose of antivirus software?(2)
a) To protect against physical damage to a
computer
b) To prevent unauthorized access to a network
c) To scan for and remove malicious software
d) To encrypt sensitive data
What is encryption?(2)
a) A method of hiding physical objects
b) A process of converting data into a secret code
c) A way to protect against malware attacks
What is a vulnerability?(2)
a) A type of antivirus software
b) A weakness in a computer system that can be
exploited by attackers
c) A method of securing wireless networks
What is a data backup?(2)
a) A physical break-in at a data center
b) A situation where data is accidentally deleted
c) An unauthorized access to sensitive information
d) A process of creating copies of data to protect
against data loss
What is the best practice for securing sensitive
data?(2)
a) Storing it on a public server
b) Sharing it with colleagues via email
c) Encrypting it before storage or transmission
d) Using weak passwords for easy access
What is the purpose of a password manager?(2)
a) To store passwords securely
b) To encrypt network traffic
c) To detect malware
d) To optimize internet speed
_______ is a security measure that involves
using multiple authentication factors to verify a
user's identity.(2)
a) Firewall
b) VPN
c) Two-factor authentication (2FA)
d) Biometric authentication
_______ is a security measure that involves
creating a copy of data to protect against loss or
damage.(2)
a) Firewall
b) VPN
c) Two-factor authentication (2FA)
d) Data backup
_______ is a type of malware that spreads by
making copies of itself and infecting other files
or systems.(2)
a) Spyware
b) Ransomware
c) Trojan
d) Virus
_______ is a type of attack where an attacker
gains unauthorized access to a computer system
by guessing a user's password using a premade
list of possible passwords.(2)
a) Phishing
b) Malware
c) Encryption
d) Password cracking
What does the term "malware" refer to?(2)
a) Software that protects against viruses
b) Software that monitors network traffic
c) Software that steals sensitive information
d) Software that does something malicious
Why are strong passwords needed for a secure
use of IT systems?(2)
a)Because they are harder to remember
b)Because they are harder to break
c)Because they help improve the user's typing
skills
What represents a strong password:(2)
a.14 character long string of random letters
b.14 character long string of random letters and
numbers
c.14 character long string of random letters,
numbers and symbols
Should you use different passwords for different
online services? (1)
a)Yes
b)No
Are public Wifi networks less secure than private
ones?(1)
a)Yes
b)No
Can antivirus software protect against all types
of malware? (1)
a)Yes
b)No
Is it possible for a computer to be infected with
malware without the user's knowledge?(1)
a)Yes
b)No
Is it advisable to share your passwords with
others? (1)
a)Yes
b)No
Can social engineering attacks exploit human
psychology to gain unauthorized access to
information?(1)
a)Yes
b)No
Is it safe to install software or apps from
untrusted sources? (1)
a)Yes
b)No
Can encryption protect sensitive data from
unauthorized access?(1)
a)Yes
b)No
Can regular data backups help protect against
data loss in case of a cyber attack or hardware
failure? (1)
a)Yes
b)No
Is it safe to leave your computer unattended
without locking it?(1)
a)Yes
b)No
What is the purpose of regular software
updates? (3)
a)Each new version makes the system perform
better
b)Updates add new features that are desired by
end users
c)Patches often fix security vulnerabilities
discovered in the system
What is a ransomware attack?(3)
a)An attack in which hackers render a person's or
company's data unusable by encrypting it, then
asking for money in exchanhge for decrypting it)
b)An attack in which a hacker asks for money in
exchange for not infecting a person's computer
with malware
c)An attack in which a hacker steals all the data of
a person or company and leaks it online for
everyone to see
What is the purpose of a firewall? (3)
a) To protect against physical theft
b) To prevent unauthorized access to a network
c) To encrypt data during transmission
d) To scan for viruses on a computer
What is a VPN?(3)
a) A virtual private network used for secure
communication
b) A type of computer virus that spies on all
network traffic
c) A method of encrypting emails
What is the main goal of a DDoS (Distributed
Denial of Service) attack? (3)
a) To steal sensitive information
b) To gain unauthorized access
c) To overload a network or website
d) To encrypt network traffic
_______ is a security measure that involves
verifying the identity of a user or device before
granting access to a computer system or
network)(3)
a) Firewall
b) VPN
c) Authentication
d) Intrusion Detection System (IDS)
_______ is a type of attack where an attacker
sends a malicious email that appears to be from
a trusted source in order to trick the recipient
into revealing sensitive information) (3)
a) Phishing
b) Ransomware
c) Social engineering
d) Spear phishing
What is the purpose of encryption in
cybersecurity?(3)
a) To hide network traffic
b) To prevent unauthorized access
c) To speed up data transmission
d) To protect data confidentialit
What is the primary purpose of a security patch?
(3)
a) To prevent phishing attacks
b) To encrypt network data
c) To fix software vulnerabilities
d) To detect and remove malware
_______ is a type of attack where an attacker
sends a large amount of traffic to a target
system, causing it to become overwhelmed and
unavailable) (4)
a) Phishing
b) Ransomware
c) Social engineering
d) Denial of Service (DoS)
A _______ is a program that appears legitimate
but actually performs malicious activities on a
computer system)(4)
a) Firewall
b) VPN
c) Trojan horse
d) Brute force attack
_______ is the process of converting plaintext
into ciphertext to protect sensitive information
from unauthorized access) (4)
a) Phishing
b) Malware
c) Encryption
d) CAPTCHA
_______ is a security measure that involves
monitoring and analyzing events occurring
within a computer system or network to detect
and respond to potential security incidents)(4)
a) Firewall
b) VPN
c) Intrusion Detection System (IDS)
d) Biometric authentication
_______ is a technique used by attackers to gain
unauthorized access to a computer system by
intercepting wireless network traffic) (4)
a) Phishing
b) Malware
c) Encryption
d) Wi-Fi eavesdropping
_______ is a technique used by attackers to gain
unauthorized access to a computer system by
impersonating a legitimate website or service)
(4)
a) Phishing
b) Malware
c) Encryption
d) Spoofing