JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
Quiz
Sign in to Google
to save your progress.
Learn more
* Indicates required question
1.Which of the following best defines cybersecurity?
*
The practice of protecting computer hardware from physical damage.
The protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
A process to ensure that all data is stored on the cloud.
The study of computer programming languages.
2.What is the primary purpose of a firewall in network security?
*
To monitor and control incoming and outgoing network traffic based on security rules.
To backup data automatically.
To scan for and remove viruses.
To encrypt data on a hard drive
3.Which type of attack involves tricking someone into providing confidential information, such as passwords?
*
Phishing
DDoS attack
Man-in-the-Middle attack
SQL Injection
4.What does the term 'vulnerability' refer to in cybersecurity?
*
A type of malware that replicates itself.
A weakness in a system that can be exploited by a cyber threat.
A method for encrypting sensitive data.
A security tool that scans for malware.
5.Which of the following is NOT a common type of malware?
*
Virus
Worm
Firewall
Trojan Horse
6.What is the main function of an Intrusion Detection System (IDS)?
*
To detect and respond to unauthorized access or attacks on a network.
To backup files and data on a regular basis.
To encrypt all outgoing and incoming emails.
To monitor employee productivity.
7.In the context of cybersecurity, what is a 'botnet'?
*
A software tool used to detect malware.
A network of private computers infected with malicious software and controlled as a group.
A secure, encrypted connection between two devices.
A type of firewall that uses AI to detect threats.
8.Which cybersecurity measure focuses on ensuring that only authorized users have access to specific information or systems?
*
Confidentiality
Integrity
Availability
Accountability
9.What does 'ransomware' do when it infects a computer system?
*
It encrypts the user's files and demands payment for the decryption key.
It slows down the system performance by using resources.
It scans the network for other devices to infect.
It disables the firewall and antivirus software.
10.Which of the following is a best practice for creating a strong password?
*
Using your birthdate and name combination.
Using a mix of upper and lower case letters, numbers, and symbols.
Using the same password for multiple accounts to remember it easily.
Writing the password down and storing it near your computer.
Submit
Clear form
Forms
This content is neither created nor endorsed by Google.
Report Abuse
Terms of Service
Privacy Policy