Fun Cyber Security Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Whoneyman
W
Whoneyman
Community Contributor
Quizzes Created: 1 | Total Attempts: 9,861
Questions: 15 | Attempts: 9,939

SettingsSettingsSettings
Fun Cyber Security Quiz - Quiz

Are you well aware of the intricate details of cyber security? Why not give this fun cyber security quiz a try? We are sure that you'll love it! The questions in the quiz are specially designed to test your knowledge and hopefully, you can learn more about the concept as you go through each question. All the questions are compulsory. Please make sure to read all the questions carefully before answering. We suggest that you take this fun quiz with your friends for a fun time. Hope you have fun learning! Good Luck!


Questions and Answers
  • 1. 

    What is the most common delivery method for viruses?

    • A.

      Email

    • B.

      Instant Message

    • C.

      Internet download

    • D.

      Portable media

    Correct Answer
    A. Email
    Explanation
    Although viruses can be delivered by any of the other methods, opening an email attachment is the most common delivery of viruses.

    Rate this question:

  • 2. 

    Which of the following would be the best password?

    • A.

      MySecret

    • B.

      Iw2c^tILV

    • C.

      Abc123

    • D.

      Keyboard

    • E.

      George1234

    Correct Answer
    B. Iw2c^tILV
    Explanation
    A secure password must be made up of random characters but easy to remember. Iw2c^tILV can easily be remembered by the phrase "I went to see Carrot Top in Las Vegas.

    Rate this question:

  • 3. 

    Your sister sends you an e-mail at work with a screen saver she says you would love. What should you do? (Select all that apply)

    • A.

      Download it onto your computer, since it's from a trusted source.

    • B.

      Forward the message to other friends to share it.

    • C.

      Call IT and ask them to help install it for you

    • D.

      Delete the message.

    Correct Answer
    D. Delete the message.
    Explanation
    This one has four big risks:
    1. Some screen savers contain viruses or other malicious programs, so just in general, it's risky to put unknown or unsolicited programs or software on your computer.
    2. Also, in some cases just clicking on a malicious link can infect a computer, so unless you are sure a link is safe, don't click on it.
    3. Email addresses can be faked, so just because the email says it is from someone you know, you can't be certain of this without checking.
    4. Finally, some websites and links look legitimate, but they're really hoaxes designed to steal your information.

    Rate this question:

  • 4. 

    The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? (Select all that apply)

    • A.

      Call your co-workers over so they can see.

    • B.

      Contact the IT Helpdesk immediately.

    • C.

      Unplug your mouse.

    • D.

      Turn your computer off.

    • E.

      Run anti-virus.

    • F.

      All of the above.

    Correct Answer
    B. Contact the IT Helpdesk immediately.
    Explanation
    This is definitely suspicious. Immediately report the problem to the IT Help Desk.
    Also, since it seems possible that someone is controlling the computer remotely, it is best if you can disconnect the computer from the network until help arrives. If possible, do not turn off the computer.

    Rate this question:

  • 5. 

    When receiving an email from an unknown contact that has an attachment, you should:

    • A.

      Open the attachment to view its contents

    • B.

      Delete the email

    • C.

      Forward the email to your co-workers to allow them to open the attachment first

    • D.

      Forward the email to your personal email account so you can open it at home

    Correct Answer
    B. Delete the email
    Explanation
    You should never open attachments that you are not expecting.

    Rate this question:

  • 6. 

    Which of the following is a proper use of email?

    • A.

      Never email personal information

    • B.

      Send out pricelists for your home-based business products

    • C.

      Forward inspirational and humorous emails to your co-workers to brighten their day

    • D.

      Send an email to all your friends and co-workers to advertise a job opening in your area

    Correct Answer
    A. Never email personal information
    Explanation
    Sending personal information through email is not a proper use because it can potentially compromise the security and privacy of the information. Email is not a secure method of communication, and personal information such as social security numbers, credit card details, or passwords should never be shared through email. It is important to use more secure methods, such as encrypted messaging or secure file sharing, when transmitting personal information.

    Rate this question:

  • 7. 

    You receive an e-mail with an attachment from "I.T. Security." The e-mail says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do? (Select all that apply)

    • A.

      Follow the instructions ASAP to avoid the virus

    • B.

      Open the e-mail attachment to see what it says.

    • C.

      Reply to the sender and say "take me off this list".

    • D.

      Delete the message from the unknown source.

    • E.

      Contact the IT Help Desk and ask about the email.

    Correct Answer(s)
    D. Delete the message from the unknown source.
    E. Contact the IT Help Desk and ask about the email.
    Explanation
    Attachments can contain viruses and other malicious programs that can infect your computer, so opening or clicking on an unexpected or unknown attachment is very risky.
    If you can tell that this is spam, delete the E-mail message. If you are unsure about whether you should open the attachment, contact the IT Help Desk [email protected] for further instructions. As a general rule, don't open, reply to, or forward suspicious e-mails or attachments

    Rate this question:

  • 8. 

    Which of the following is a good way to create a password? (Select all that apply)

    • A.

      Your children's or pet's names

    • B.

      Using look-alike substitutions of numbers or symbols

    • C.

      A combination of upper and lowercase letters mixed with numbers and symbols

    • D.

      Using common names or words from the dictionary

    • E.

      Using a password generator

    • F.

      Using letters, numbers, specal characters and recording it on a sticky note attached to your monitor

    Correct Answer(s)
    C. A combination of upper and lowercase letters mixed with numbers and symbols
    E. Using a password generator
    Explanation
    A secure password is at least eight characters long.
    Does not contain your user name, real name, or company name.
    Does not contain a complete word.
    Is significantly different from previous passwords.
    Contains characters from each of the following four categories:
    Uppercase letters
    Lowercase letters
    Numbers
    Symbols

    Rate this question:

  • 9. 

    Instant Messaging is safer than regular email.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Viruses can be spread through instant messaging

    Rate this question:

  • 10. 

    If a co-worker sends you an email with a link to a website and a subject line that reads "You have to see this...soooo funny" (Select all that apply)

    • A.

      Open the link and then forward the email to 10 of your closest friends

    • B.

      Delete the email

    • C.

      Forward the email to your personal email, open it at home and hope that it does not contain a virus

    • D.

      Ask Donna to stop it

    Correct Answer(s)
    B. Delete the email
    C. Forward the email to your personal email, open it at home and hope that it does not contain a virus
    D. Ask Donna to stop it
    Explanation
    Never use your Murnane email account to send or receive non business related emails as viruses can be spread through web links, pictures, videos ect.

    Rate this question:

  • 11. 

    Who amongst the following is known for computer virus defense techniques? 

    • A.

      Eric Corley

    • B.

      Tim Berners-Lee

    • C.

      Robert Tappan Morris

    • D.

      Fred Cohen

    Correct Answer
    D. Fred Cohen
    Explanation
    Fred Cohen is known for his work in computer virus defense techniques. He is a computer scientist and is credited with coining the term "computer virus." Cohen conducted groundbreaking research on computer viruses in the 1980s and developed early techniques for detecting and defending against them. His work laid the foundation for modern antivirus software and helped establish the field of computer security.

    Rate this question:

  • 12. 

    Who coined the term "Virus"? 

    • A.

      Len Adleman

    • B.

      Carl Pomerance

    • C.

      Ron Rivest

    • D.

      John Brunner

    Correct Answer
    A. Len Adleman
    Explanation
    Len Adleman is credited with coining the term "Virus." He is an American computer scientist who, along with his colleagues, developed the RSA encryption algorithm. Adleman used the term "Virus" to describe self-replicating computer programs that can infect other programs and disrupt computer systems. His work has been influential in the field of computer security and cryptography.

    Rate this question:

  • 13. 

    Which of the following is a type of computer threat?

    • A.

      Phishing

    • B.

      Soliciting

    • C.

      Dos Attack

    • D.

      None of the above

    Correct Answer
    C. Dos Attack
    Explanation
    A DoS (Denial of Service) attack is a type of computer threat where an attacker overwhelms a target system with a flood of illegitimate requests, rendering it unable to respond to legitimate requests. This can lead to a disruption of services, loss of data, and potential financial or reputational damage. Unlike phishing, which involves tricking individuals into revealing sensitive information, and soliciting, which refers to requesting or seeking something, a DoS attack directly targets the availability and functionality of a computer system. Therefore, the correct answer is Dos Attack.

    Rate this question:

  • 14. 

    ____________________ is a special software designed to detect computer viruses and avoid them from the system.

    • A.

      Spyware

    • B.

      Malware

    • C.

      Adware

    • D.

      Antivirus

    Correct Answer
    D. Antivirus
    Explanation
    An antivirus is a specialized software that is specifically designed to detect and prevent computer viruses from infecting a system. It scans files and programs, identifies any potential threats, and takes necessary actions to remove or quarantine them. It provides real-time protection by continuously monitoring the system for any suspicious activities or malware attacks. By regularly updating virus definitions, an antivirus ensures that it can effectively detect and neutralize the latest threats. Therefore, an antivirus is an essential tool for maintaining the security and integrity of a computer system.

    Rate this question:

  • 15. 

    Which of the following is an example of an antivirus program? 

    • A.

      Mcafee

    • B.

      Quick heal

    • C.

      Kaspersky

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of the options listed, namely McAfee, Quick Heal, and Kaspersky, are examples of antivirus programs. Each of these programs is designed to detect, prevent, and remove malicious software or malware from a computer system. They provide real-time protection, regular system scans, and updates to ensure the security of the system. Therefore, the correct answer is "All of the above."

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 13, 2014
    Quiz Created by
    Whoneyman
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.