Fun Cyber Security Quiz

15 Questions | Total Attempts: 7288

SettingsSettingsSettings
Fun Cyber Security Quiz - Quiz

Are you well aware of the intricate details of cyber security? Why not give this fun cyber security quiz a try? We are sure that you'll love it! The questions in the quiz are specially designed to test your knowledge and hopefully, you can learn more about the concept as you go through each question. All the questions are compulsory. Please make sure to read all the questions carefully before answering. We suggest that you take this fun quiz with your friends for a fun time. Hope you have fun learning! Good Luck!


Questions and Answers
  • 1. 
    What is the most common delivery method for viruses?
    • A. 

      Email

    • B. 

      Instant Message

    • C. 

      Internet download

    • D. 

      Portable media

  • 2. 
    Which of the following would be the best password?
    • A. 

      MySecret

    • B. 

      Iw2c^tILV

    • C. 

      Abc123

    • D. 

      Keyboard

    • E. 

      George1234

  • 3. 
    Your sister sends you an e-mail at work with a screen saver she says you would love. What should you do? (Select all that apply)
    • A. 

      Download it onto your computer, since it's from a trusted source.

    • B. 

      Forward the message to other friends to share it.

    • C. 

      Call IT and ask them to help install it for you

    • D. 

      Delete the message.

  • 4. 
    The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? (Select all that apply)
    • A. 

      Call your co-workers over so they can see.

    • B. 

      Contact the IT Helpdesk immediately.

    • C. 

      Unplug your mouse.

    • D. 

      Turn your computer off.

    • E. 

      Run anti-virus.

    • F. 

      All of the above.

  • 5. 
    When receiving an email from an unknown contact that has an attachment, you should:
    • A. 

      Open the attachment to view its contents

    • B. 

      Delete the email

    • C. 

      Forward the email to your co-workers to allow them to open the attachment first

    • D. 

      Forward the email to your personal email account so you can open it at home

  • 6. 
    Which of the following is a proper use of email?
    • A. 

      Never email personal information

    • B. 

      Send out pricelists for your home-based business products

    • C. 

      Forward inspirational and humorous emails to your co-workers to brighten their day

    • D. 

      Send an email to all your friends and co-workers to advertise a job opening in your area

  • 7. 
    You receive an e-mail with an attachment from "I.T. Security." The e-mail says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do? (Select all that apply)
    • A. 

      Follow the instructions ASAP to avoid the virus

    • B. 

      Open the e-mail attachment to see what it says.

    • C. 

      Reply to the sender and say "take me off this list".

    • D. 

      Delete the message from the unknown source.

    • E. 

      Contact the IT Help Desk and ask about the email.

  • 8. 
    Which of the following is a good way to create a password? (Select all that apply)
    • A. 

      Your children's or pet's names

    • B. 

      Using look-alike substitutions of numbers or symbols

    • C. 

      A combination of upper and lowercase letters mixed with numbers and symbols

    • D. 

      Using common names or words from the dictionary

    • E. 

      Using a password generator

    • F. 

      Using letters, numbers, specal characters and recording it on a sticky note attached to your monitor

  • 9. 
    Instant Messaging is safer than regular email.
    • A. 

      True

    • B. 

      False

  • 10. 
    If a co-worker sends you an email with a link to a website and a subject line that reads "You have to see this...soooo funny" (Select all that apply)
    • A. 

      Open the link and then forward the email to 10 of your closest friends

    • B. 

      Delete the email

    • C. 

      Forward the email to your personal email, open it at home and hope that it does not contain a virus

    • D. 

      Ask Donna to stop it

  • 11. 
    Who amongst the following is known for computer virus defense techniques? 
    • A. 

      Eric Corley

    • B. 

      Tim Berners-Lee

    • C. 

      Robert Tappan Morris

    • D. 

      Fred Cohen

  • 12. 
    Who coined the term "Virus"? 
    • A. 

      Len Adleman

    • B. 

      Carl Pomerance

    • C. 

      Ron Rivest

    • D. 

      John Brunner

  • 13. 
    Which of the following is a type of computer threat?
    • A. 

      Phishing

    • B. 

      Soliciting

    • C. 

      Dos Attack

    • D. 

      None of the above

  • 14. 
    ____________________ is a special software designed to detect computer viruses and avoid them from the system.
    • A. 

      Spyware

    • B. 

      Malware

    • C. 

      Adware

    • D. 

      Antivirus

  • 15. 
    Which of the following is an example of an antivirus program? 
    • A. 

      Mcafee

    • B. 

      Quick heal

    • C. 

      Kaspersky

    • D. 

      All of the above

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.