Threats To Systems, Data & Information Quiz (C)

threats to systems, data & information Quiz (B)

Date First Published: 24th August 2023

This is the third quiz about the threats to systems, data & information subtopic. All 15 questions in this quiz are covered in the articles.

Quiz Instructions

Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.

Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.

Warning: Warning Icon

Do not reload the page whilst you are in the process of answering the questions as you will lose your selected answers and will have to start the quiz all over again.

Quiz Tips

  • There is no time limit on this quiz. You can take as long as you want to on each question, so don't rush.
  • This quiz should be completed from memory. Avoid looking back at the articles, clicking on 'Reveal answers' before you have completed the quiz, or looking up the answers on search engines.
  • Answer all the questions. Avoid leaving questions blank as that will guarantee that you get that question wrong.

Question 1

Simon unintentionally fell for a phishing scam after receiving an email pretending to be from his social media provider. What should he do to limit the damage?





Question 2

What is the impact of cyberbullying on individuals?





Question 3

Which of the following can protect against technical support scams?





Question 4

Which of the following is NOT an example of a technical support scam?





Question 5

True or false? Catfishing is a type of phishing attack.



Question 6

Which of the following is an example of a chain email?





Question 7

What is the recommended action to take when receiving a chain email?





Question 8

What is the general term used to describe the use of deception tactics to get a user to give away their sensitive information?





Question 9

The main difference between phishing and spear phishing is that:





Question 10

Pharming can be known as:





Question 11

Which of the following can help prevent a DDoS attack?





Question 12

Is trolling usually targeted towards specific users or towards users in general?





Question 13

What is NOT an example of a place where cyberbullying can happen?





Question 14

Which of the following is the best way to handle internet trolls?





Question 15

Someone posts some degrading photos of someone else on social media to mock them without their permission. This can be considered cyberbullying. True or false?



Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.


Comments

Log in to post a comment.

0 comment(s) Write a comment