MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
Cyber Security
Quiz 2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
If a website is using HTTPS it means that...
Data sent and received is encrypted
Data sent and received can be viewed by others
Data received is encrypted
Data sent is encrypted
Q.2
______________ is way of protecting internet-connected systems, including: hardware, software and data, from cyberattacks
Cyber Security
Cyber Safe
SPAM
DDOS
Q.3
What do we use a SPAM filter for?
To arrange emails in order by name
To prevent common scams
To attach a file to an email
To scan an email for viruses
Q.4
Qwertyis a Strong Password (i.e. not a cyber security risk)
True
False
Q.5
Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?
True
False
Q.6
If testers have little to no information regarding the system they are trying to hack they are:
White box testing
Yellow box testing
Black box testing
Blue box testing
Q.7
What type of program can you install to prevent malware?
Antivirus software
Office software
A new operating system
A disk defragmenter
Q.8
Which of these will not put you at risk of malware attacks?
Opening email attachments from unknown sources.
Downloading pirate movies from torrent services
Not installing updates for your operating system
Using a free operating system like Linux, as opposed to using Windows
Q.9
What should a strong password include?
At least one upper case letter
At least 8 characters
At least one number
All of above
Q.10
What is blagging?
Observing a person's private info over their shoulder
Cyber attack to redirect a website's traffic to another, fake site
Inventing a scenario to target someone into divulging information
A virus that registers key strokes
Q.11
What does DDOS stand for?
Denial Data Operation System
Domain Data Overwrite Service
Distributed Domain Or Service
Distributed Denial Of Service
Q.12
Which one of the following is NOT a type of CyberSecurity Attack?
Worms
Randsomware
Spyware
Password Management
Q.13
Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?
Malware
Formalware
Scams
The Spreading attackers
Q.14
How did the reporters gain access to peoples voicemail in mobile phone hacking scandal in 2012?
They spoke to the victoms
They hacked their computers
They tried using the default PIN number which was frequently unchanged
They used white box testing
Q.15
What should you look out for when reading emails
All of above
Poor spelling and grammar
Sender's email
Request for personal information
Q.16
Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access
True
False
Q.17
What is a Trojan malware?
A type of malware that appears to be a legitimate program, but actually causes harm
A type of malware that deletes programs on the system each time replacing them with itself
A type of malware that spies on users without their knowledge
A type of malware that removes and sends all of your files to a third party, over time so you don't notice
Q.18
What does malicious mean?
Something intended to do harm
Something that makes you ill
Something good
Tasty
Q.19
Thomas never discloses personal information when using the internet, what is he practicing?
Online Shopping
Cyber-Security
Cyber bullying
Online gaming
Q.20
Why is it important to protect your identity online?
Because being online is a safe environment
Because everyone does it
Because someone might steal your personal information.
Because your parents told you to
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page