Cyber Security Quiz! Ultimate Trivia

36 Questions | Total Attempts: 5860

SettingsSettingsSettings
Please wait...
Cyber Security Quiz! Ultimate Trivia

Cybersecurity quiz ultimate trivia. The introduction of the internet has made it possible for people from all walks of life to interact with each other. This has made it possible for people with ill intentions to harm or spam others with unwanted data. Are your emails safe from hackers and spam emails? This quiz will help you answer that question with ease. Do give it a shot and see how well you will do!


Questions and Answers
  • 1. 
    Which one of the following describes spam?
    • A. 

      Gathering information about a person or organisation without their knowledge.

    • B. 

      Performing an unauthorised, usually malicious, action such as erasing files.

    • C. 

      Putting unnecessary load on the network by making copies of files.

    • D. 

      Sending unwanted bulk messages.

  • 2. 
    • A. 

      Anti-spam software.

    • B. 

      Anti-virus software.

    • C. 

      Anti-spyware software.

    • D. 

      PC diagnostic software.

  • 3. 
    Which one of the following could lead to the spread of a malicious program?
    • A. 

      Using only software that has been checked for viruses.

    • B. 

      Maintaining regularly updated anti-virus software.

    • C. 

      Opening only virus-checked file attachments from known sources.

    • D. 

      Using a USB Flash Drive from an unknown source to exchange data.

  • 4. 
    Which one of the following describes why it is important to update antivirus software regularly?
    • A. 

      To protect your computer from all known viruses.

    • B. 

      To ensure the software identifies old viruses.

    • C. 

      To protect your computer from unwanted bulk messages.

    • D. 

      To prevent the spread of malicious programs on the Internet.

  • 5. 
    Which one of the following describes what you should do if you receive a chain letter email?
    • A. 

      Forward the email.

    • B. 

      Download it onto your system.

    • C. 

      Delete the email.

    • D. 

      Send a read receipt.

  • 6. 
    • A. 

      A skilled programmer who uses authorised access to exploit information available on a computer.

    • B. 

      A skilled programmer who secretly invades computers without authorisation.

    • C. 

      A skilled programmer who writes programs to train new employees.

    • D. 

      A skilled programmer who helps in the installation of new software for an organisation.

  • 7. 
    Which one of the following describes why firewalls are used?
    • A. 

      To prevent unauthorised access by incoming transmissions.

    • B. 

      To prevent destruction of a computer in the event of a fire.

    • C. 

      To enable easy downloading of data from web sites.

    • D. 

      To detect and disable viruses already on a computer.

  • 8. 
    • A. 

      An email from a friend you have not seen recently.

    • B. 

      An email with an attachment sent by a colleague using their personal email address.

    • C. 

      An email asking you to go to a website for a free computer scan.

    • D. 

      An email advertisement from a local shop you subscribe to.

  • 9. 
    Which one of the following is the reason that users should log on with a username and password?
    • A. 

      To be aware of who is in the building.

    • B. 

      To check up on the time-keeping of users.

    • C. 

      To protect computers against unauthorised use.

    • D. 

      To enable a personalised greeting for each user.

  • 10. 
    Which one of the following statements about a password is TRUE?
    • A. 

      It must be changed only if it is compromised.

    • B. 

      It cannot contain special character symbols.

    • C. 

      It must be registered with the system administrator.

    • D. 

      It should be changed regularly.

  • 11. 
    Which one of the following should be used to change your password?
    • A. 

      Control Panel.

    • B. 

      Anti-virus software.

    • C. 

      Windows Firewall.

    • D. 

      Internet Explorer.

  • 12. 
    Which one of the following shows respect for the confidentiality of information?
    • A. 

      Discussing confidential information over the telephone.

    • B. 

      Disclosing confidential information only to authorised individuals.

    • C. 

      Uploading confidential information to a shared web site.

    • D. 

      Emailing confidential information to a colleague.

  • 13. 
    Which one of the following would be considered the BEST way to store a PIN number?
    • A. 

      Keep a written note of it with you bank cards.

    • B. 

      Store it on your computer.

    • C. 

      Memorise it.

    • D. 

      Keep a written note of it in your office drawer.

  • 14. 
    Which one of the following describes why users should lock their computer when leaving their desk?
    • A. 

      To prevent unauthorised access to data.

    • B. 

      To prevent a waste of electricity.

    • C. 

      To prevent data from getting corrupted.

    • D. 

      To prevent the computer from malfunctioning.

  • 15. 
    • A. 

      An email warning the recipient of a computer virus threat.

    • B. 

      An email directing the recipient to forward the email to friends.

    • C. 

      An email directing the recipient to enter personal details on a fake website.

    • D. 

      An email directing the recipient to download an attachment.

  • 16. 
    • A. 

      Using a screen name or nick name that cannot identify you.

    • B. 

      Meeting someone you met online face-to-face in the company of your parents.

    • C. 

      Keeping your social network profile private.

    • D. 

      Giving your home address to someone you met in a chat room.

  • 17. 
    Which one of the following describes a public network?
    • A. 

      A network where devices outside the network cannot see or communicate directly with computers on the network.

    • B. 

      A network where devices outside the network can see but cannot communicate directly with computers on the network.

    • C. 

      A network where devices outside the network can see and communicate directly with computers on the network.

    • D. 

      A network where devices outside the network cannot see but can communicate directly with computers on the network.

  • 18. 
    Which one of the following describes how confidential information should be sent using an unsecured network?
    • A. 

      In an unsigned email.

    • B. 

      In an encrypted format.

    • C. 

      In a compressed format.

    • D. 

      In an attachment.

  • 19. 
    Which one of the following statements about wireless networks is TRUE?
    • A. 

      They cannot be intercepted by unknown users.

    • B. 

      They limit accessibility to other users.

    • C. 

      They limit visibility to other users.

    • D. 

      They can be accessible to other users.

  • 20. 
    Which one of the following is the recommended action to prevent the risk of access to a network by other users?
    • A. 

      Disconnect the computer from the network.

    • B. 

      Complain to the System Administrator.

    • C. 

      Change the default WEP or WPA access key to one that only you know.

    • D. 

      Adjust the Internet security settings.

  • 21. 
    Which one of the following describes Bluetooth?
    • A. 

      Short-range wired protocol for exchanging data.

    • B. 

      Short-range wireless protocol for exchanging data.

    • C. 

      Long-range wireless protocol for exchanging data.

    • D. 

      Long-range wired protocol for exchanging data.

  • 22. 
    Which one of the following describes why Bluetooth device settings should be adjusted?
    • A. 

      To increase the range of the device.

    • B. 

      To improve the quality of reception.

    • C. 

      To prevent the risk of unauthorised access.

    • D. 

      To reduce interference from other devices.

  • 23. 
    Which one of the following would result in the loss of contact details if it were stolen?
    • A. 

      Printer.

    • B. 

      Mobile Phone.

    • C. 

      Modem.

    • D. 

      MP3.

  • 24. 
    Which one of the following should you do to ensure that your USB the storage device is kept safe and secure?
    • A. 

      Only use it in private surroundings.

    • B. 

      Do not access it using a Bluetooth device.

    • C. 

      Use firewall software.

    • D. 

      Never leave it unattended.

  • 25. 
    Which one of the following departments would usually hold guidelines and procedures for the secure use of IT within an organization?
    • A. 

      The IT Department.

    • B. 

      The Marketing Department.

    • C. 

      The Sales Department.

    • D. 

      The Finance Department.