Standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
  • Malicious Code
  • Computer Worm
  • Anti Virus Software
  • Computer Virus
type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.
  • Computer Virus
  • Computer Worm
  • MyDoom
  • Malicious Code
How does malware get onto your computer?
  • Email attachments or links
  • By visiting dodgy websites
  • On USB sticks
  • All of the above
Malware is made to stop your device from running properly and sometimes to steal your information.
  • True
  • False
Which is NOT a type of malware?
  • Virus
  • Worm
  • Trojan horse
  • Sandwich
Which of the following best describes a Trojan Horse
  • Malicious software that misleads users of its intent, which is to allow unauthorised access to your system
  • Malicious software that replicates itself and spreads through your network to steal data
  • Malicious software that it usually attached to an email and sends itself around a network to allow unauthorised access to your system
  • Malicious software that sets your computer on fire
When visiting a website, you notice a lock icon in the lower-right corner of the browser window.  What does the lock represent?
  • A link to open another site
  • A webpage that has a secure connection
  • A program that prevents you from leaving the page
  • A warning that you are not allowed to view this webpage
Special types of viruses that can travel from computer to computer without human action; self-replicating and can multiply until it uses up the computer's resources
  • spyware
  • worms
  • trojans
  • phishing
An online shopping website want to track user purchase. The website commonly user data file to store purchasing history. These files are commonly know as:
  • Cookie
  • Widgets
  • script
  • logs
When do you need to use AntiVirus software?
  • When you first get your computer.
  • All the time, on your laptop only -and make sure it is updated!
  • All the time, on ALL digital devices -and make sure it is updated!
  • As soon as you start to feel sick.
What should you do if you think you have been hacked?
  • Report the problem to the company.
  • Change your password.
  • Tell your parents or a trusted adult.
  • All of the above.
What is Spam?
  • Canned meat.
  • Unsolicited emails sent to many email addresses that try to get you buy something or share private information.
  • A computer virus that will hack your account.
To keep your browser private, you can use the _______ mode.
  • incognito
  • confidential
  • encrypted
  • deception
Which of these is an example of a phishing email?
  • You have won the lottery! Follow this link to claim.
  • Your bank account has been hacked. Login in here to protect yourself.
  • Help! I am stuck in Europe and I need money to travel home.
  • All of the above!
Which of these is an indicator that the website is secure.
  • Bruce Lee photo
  • The http://
  • The https://
  • The https:\\
What is the term for computer programs that can wreak havoc on your device?
cs-2 sb-1-Cyber Securityimg_no 100.jpg
  • Dangerbots
  • Problemware
  • Malware
  • Hyperlinks
What is spyware??
  • When your kids use your phone
  • James Bond's movie
  • Software that collects data from computer
  • a cyber criminal
What is phishing??
  • Wrong spelling of fishing
  • When criminals try to act like trustworthy sources and try to steal info
  • Criminal who goes to lake to find data
  • A type of computer virus
Which of the following is a phishing email??
  • You have won a lottery!! Follow this link to claim it!!
  • Your bank account has been compromised. Login here to protect yourself.
  • Help.I am stuck aboard and urgently need money transferred to me to get home.
  • All of the above. Be careful.
When do you need to use anti-virus software.
  • When you are sick.
  • When you are a doctor and give appointments
  • When you buy your first computer
  • All the time, in all devices and wireless connections to protect your devices.
Which of these were not the most common passwords of 2015
  • hello
  • 1234
  • Password
  • qwerty
What is the best password policy?
  • Always write the same passwords in every link
  • Your name, personal details
  • Have random password which you can't remember
  • Never use remember password and keep complex passwords you can remember
Which of these is the most secure wifi username?
  • HiWiFi
  • HelloWiFi
  • WiFi
  • Doesn't matter
What can we use to protect our computer from hackers
  • fire wall
  • a picture which says "stay away"
  • Using a non approved VPN
  • all of the above
What is Ransomware
  • A Disease you get from playing to much Fortnite
  • A type of malware that wants Money
  • An Anti Virus Software
  • Software that protects you from Phishing
An Antivirus protects you from all attacks
  • True
  • False
Who should know your passwords?
  • Only you!
  • Your best friends
  • Anyone
What is the term for computer programs that attack your computer?
  • Malware
  • DangerDroids
  • RudeBots
  • Dangerware
What does the "https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?
  • That the site has special high definition
  • That information entered into the site is encrypted and secured
  • That the site is the newest version available
  • That the site is not accessible to certain computers
Which of the following four passwords is the most secure?
  • Boat123
  • WTh!5Z
  • 123456
  • Not sure
What is AntiVirus software?
  • Software that blocks all unwanted ads.
  • Software that keeps you from getting sick.
  • Software that protects your device from viruses and malware.
Which of these indicates a website is secure?
  • You found the website on Google or clicked it from a link in an email.
  • A little lock icon next to the website address.
  • The website shows a company name and logo and looks real.
Which of the following are the cyber tips one must follow?
  • Keep a close eye on your mobile device
  • Keep It Locked
  • Know Your Apps
  • Only Connect to the Internet if Needed
  • All of the above
It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
  • Antivirus
  • Firewall
  • Cookies
  • Malware
Which of the following refers to the violation of the principle if a computer is no more accessible?
  • Access control
  • Access control
  • Availability
  • Integrity
In the CIA Triad, which one of the following is not involved?
  • Availability
  • Confidentiality
  • Authenticity
  • Integrity
Which of the following is not the role in cyber security?
  • Security Management
  • Standing Committee
  • Executive Committee
  • Cybersecurity Practitioners
Which approach is used to implements security with no particulars aspects or criteria.
  • Compliance based security
  • Risk-based security
  • Adhoc approach
  • Risk-Free approach
Which of the password is more secure and strong.?
  • Abc123
  • Password123
  • @dm1n#32!
  • Admin
Which is best practice to remember your password.?
  • Stick the password on monitor screen
  • Paste password on keyboard
  • Write it down in your personal notebook
  • Share with your friend
What is mouse of your computer start clicking things on desktop and move around its own.?
  • Unplug the mouse
  • Turn off the computer
  • Run Anti-Virus program
  • Disconnect the internet connection immediately
If your friend asks you to share your password to use your computer for work, what should you do?
  • Being your friend, you share the password
  • You decline to provide
  • You login yourself and allow him to work
  • You create his login on your computer
What are the different types of Malwares name.? Choose all applicable
  • Viruses
  • Trojan
  • Spywares
  • Worms
  • All of the above
Is it safe to download anything from website or content provider whom you don’t trust.?
  • Yes, I will download
  • No,I will not download
You get a new email saying you Won Rs. 1,00,000 lottery in your inbox, would you open it.?
  • Open and read the email
  • No, I ignore email & delete from inbox
  • I'll keep it for future action
Updating Window patches & Anti-Virus regularly of your computer preventing your computer from any virus attacks and hacking.?
  • True
  • False
Using public WI-FI (Such as Malls/Parks/Airport) is safe to use for sensitive activity such as online banking or making payments using your Debit/Credit cards.?
  • True 
  • False
Turning off the GPS functions on your smartphone prevents any tracking of your phone’s location.?
  • True
  • False
What is Cyber Security?
  • Refers to when security bring viruses to our computer by spying
  • Refers to the computer when security protects the computer for viruses such as Malware, Spyware ,worm etc.
  • Refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
  • Refers the state of being free from danger or threat
What is the most common age for people who start committing into cyber crime?
  • 15-20
  • 21-25
  • 26-30
  • 30+
Which of these isn't a cyber crime?
  • Accessing unauthorized data/ using someone's computer without permission
  • Tricking people into downloading malware
  • Accessing the DarkWeb
  • Creating an account on something you're not old enough for
Programs that look useful, but cause damage to your computer
  • Phishing
  • Spyware
  • Worms
  • Trojans
Why should you be careful about what you open and download on the internet?
  • It could be something inappropriate.
  • It could have a virus that harms your computer.
  • It could steal information from your computer.
  • All of the above.
What is the term for computer programs that can wreak havoc on your device?
  • Virus
  • Software
  • Computer
  • Digita;
Can anyone tell me what they think spyware is?
  • When someone uses your phone
  • A spy movie
  • A criminal
  • Software that collects data from your device
What is Phishing?
  • The wrong spelling of the word fishing
  • A criminal who goes on a boat to find data in the sea
  • When someone acts like a trustworthy source to steal your information.
  • A bug that can get into your home
Which one of these is an example of a phishing email?
  • You won a new phone, click here to claim it.
  • You have a rich family member who wants to share their money. Click here to get yours.
  • Help I am stuck in a foreign country and I need some money to get back home.
  • All of the above
What software can we use to protect our device from hackers?
  • Fortnite
  • Firewall
  • Microsoft Office
  • Google Chrome
What is Anti-Virus Software?
  • Software that protects you from all animals
  • Software that protects your device
  • Software that tells you when its time to rest so you don not get sick
  • Software that protects your roof
When should you get Anti-Virus Software.
  • When you are sick
  • If you are a doctor helping someone who is sick
  • When you get a new device
  • When it is time for you to rest
 What is a policy that requires users to change passwords periodically?
  • password expiration
  • password encryption
  • password complexity
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?
  • Converting
  • Hacking
  • Phishing
Unsolicited electronic messages, especially advertising is know as?
  • Spim
  • Spam
  • Ransomware
Which of these is not a form of phishing
  • fake email
  • fake website link
  • spam
  • key logger
Which of these is NOT a good password?
  • #LooneyToons23
  • Ilovecats!95
  • password
  • #Iasw,aA!
Small files that Websites put on your computer hard disk drive when you first visit
  • Hardware
  • Cookies
  • Chips
  • Instant Files
What is Malware?
  • Software that protects your computer from viruses
  • Software that protects your computer from spyware and adware infections
  • Software that updates your computers operating system
  • Software that may harm your computer
If you receive an attachment from someone you don't know, you should never open it.
  • True
  • False
The _____ type of malware that is triggered by the user. code automatically makes copies of itself.
  • Virus
  • Worm
  • Keystroke logger
  • Toolbar
Which of the following may result in a malware infection?
  • Opening an email attachment
  • Downloading a file from a website
  • Clicking on an infected link
  • All of the above
What damage can be caused by malware?
  • Computer crashes
  • The compromising personal information, which may lead to identity theft
  • Permanent deletion
  • All of the above
The _____ type of malware, that covertly collects personal information and sends it to a third party.
  • Worm
  • Toolbar
  • Homepage hijacker
  • Spyware
Which of the following is not effective in preventing malware infections?
  • Opening email attachments
  • Turning on Windows Automatic Updates
  • Installing anti-virus software
  • Setting Internet Explorer's security setting to medium-high
If you think your computer has a virus, a good first step in solving the problem would be to:
  • Run a virus scan
  • Reformat the hard drive
  • Destroy the computer
  • Do nothing
Special program which can detect and remove viruses from computer is called
  • Virus
  • Anti virus
  • Group ware
  • Custom
What is a Trojan horse?
  • It scans downloads and email attachmentsI
  • It replicates and makes copies of itself
  • Is destructive software disguised as something good.
  • An animal
What is an email attachment
cs-2 sb-1-Cyber Securityimg_no 620.jpg
  • Is software downloaded to your computer
  • Is a computer file sent along with an email message
  • is a type of malicious software program
  • A piece of code
What is "crash" as it relates to computers?
  • To destroy the monitor
  • Smashing the hard drive into the monitor
  • The system stops functioning properly
  • To bang the mouse on the keyboard
What is an example of a firewall being effective.
cs-2 sb-1-Cyber Securityimg_no 621.jpg
  • When someone tries to hack your computer
  • When a certain website might be blocked
  • Stealing a password
  • It's literally a wall on fire...easy
It is a self-replicating program that is harmful to networks.
  • Worm
  • Trojan Horse
  • Virus
It help prevent attackers from monitoring or recording traffic between resources and computers, by making data more difficult to read.
  • Data Encryption
  • Firewall
  • Antivirus
Is this a legitimate email?
cs-2 sb-1-Cyber Securityimg_no 890.jpg
  • True
  • False
How many reported incidents of Phishing happened in 2020? Source: FBI
  • 241,324
  • 300,875
  • 19,765
  • 956,321
What is adware?
  • Various pop-ups advertisements that show up on your computer, persuading the user to click it
  • Adjectives that float across your screen
  • conceals its true content to fool someone into clicking it
  • When your computer starts to wear down
Can spyware be seen on your computer?
  • Yes
  • No
  • Sometimes
  • With specialist software
What is a virus?
  • Malware hidden in another file
  • Any type of malware
  • A cookie
  • A breed of gecko
What does DDoS Stand for?
  • Distributed Denial of Service
  • Delayed Destruction of Server
  • Delayed Denial of Style
  • Delayed Denial of Service
What is gaining unauthorised access to a computer system also known as?
  • Hacking
  • Spamming
  • Phishing
  • Logging on
Which of the following is NOT an offence under the Computer Misuse Act?
  • unauthorised access to someone else's files
  • unauthorised access to someone else's files with intent to commit further criminal offences
  • copying software and trying to sell it to someone for a profit
  • writing and distributing a virus
Storing customer data insecurely. Which law would be broken?
cs-2 sb-1-Cyber Securityimg_no 891.jpg
  • Data Protection Act 1998
  • Computer Misuse Act 1990
  • Copyright Designs and Patents Act 1988
  • General Data Protection Regulation Act 2018
Why do we use flowcharts?
  • To represent algorithms in an easy way
  • To use different maths shapes
What does this symbol represent?
cs-2 sb-1-Cyber Securityimg_no 892.jpg
  • Start
  • Sub
  • Decision
  • Process
What is this symbol used for in a flowchart?
cs-2 sb-1-Cyber Securityimg_no 893.jpg
  • A decision/question
  • A task to carry out
What does this shape represent?
cs-2 sb-1-Cyber Securityimg_no 894.jpg
  • Input/Output
  • Decision
  • Process
  • Start/Stop
Which symbol shows input?
  • oval
  • parallelogram
  • rectangle
  • diamond
What's missing from this part of a flowchart?
cs-2 sb-1-Cyber Securityimg_no 895.jpg
  • An Arrow
  • A Line
  • A Square
  • A Diamond
What is the Output if the user enters:Yes
cs-2 sb-1-Cyber Securityimg_no 896.jpg
  • Leave umbrella at home
  • Take an umbrella
What is the Output if the temperature is: 19
cs-2 sb-1-Cyber Securityimg_no 897.jpg
  • Below Freezing
  • Above Freezing
0:0:1



Answered

Not Answered

Not Visited
Correct : 0
Incorrect : 0