ComputingRevision.net

4 Cybersecurity & Legislation Quiz

Click the purple circle to select your answer

Question 1

What is phishing?

Pretending to be a real company to steal information
Tracking someone by watching their keystrokes
Offering help in exchange for login details
Leaving malware on a USB stick for someone to find

Question 2

Why is writing passwords down considered a security risk?

Passwords become longer
Passwords can be easily guessed
Passwords stop working
Passwords can be seen by unauthorised users

Question 3

Which example describes scareware?

A fake bank email requesting login details
A warning pop-up showing fake virus alerts
"Plug in this USB to see secret files!"
A hacker offering technical support

Question 4

Which type of cyber attack involves pretending to be another person?

Identity theft
Data destruction
Denial of Service
Data manipulation

Question 5

What is shoulder surfing?

Sending fake emails to trick users
Listening to someone’s phone call to gather information
Using malware to record keystrokes
Watching someone type their password over their shoulder

Question 6

What does the term malware mean?

Malicious software designed to harm systems or steal data
Software designed to protect systems from attack
Hardware used to store data
Software used to improve computer performance

Question 7

What is the main purpose of encryption?

To scramble data so it cannot be understood
To delete data permanently
To prevent physical access to a room
To back up data

Question 8

Which type of malware mainly displays unwanted adverts on a device?

Virus
Worm
Spyware
Adware

Question 9

Which prevention method is most effective at stopping unauthorised users entering a server room?

Secure backups
Anti-malware
Biometric access control
Encryption

Question 10

Which malware disguises itself as legitimate software to trick users into installing it?

Trojan horse
Adware
Worm
Spyware