Student Workbook Exam

A visually engaging illustration of a computer network with cybersecurity elements, including shields and warning symbols, in a modern, tech-savvy environment.

Cybersecurity Awareness Quiz

Test your knowledge about cybersecurity and critical infrastructures with this engaging quiz! Designed to educate students and professionals alike, this quiz covers essential topics related to online safety, phishing, and data protection.

  • 25 carefully crafted questions
  • Select multiple answers where applicable
  • Learn while you play!
25 Questions6 MinutesCreated by DefendData101
What are the Critical Infrastructures that rely heavily on computers? Select 5 that apply.
Schools
Airports
Government and Military Organizations
Hospitals
Water Power and Energy plants
Forever 21
Nail Salons
Shoe Cleaners
What is a worry that 85% of cyber security professionals fear will happen within the next five years?
A massive cyber attack to critical infrastructure
Cyber Bullying
Spam emails
Scam calls
What is a major threat to critical infrastructure?
IOT and employee owned devices
Ariel Attacks
Scam Calls
Massive Spam Emails
What should you do if you experience cyber bullying?
Block offender
Do not respond
Respond angerly
Be confrontational
Report the cyber bullying or other abuse to the site
Make a counter-post calling the offender out?
You should save screenshots of cyberbullying as evidence
True
False
What does PPII stand for?
Personal Protected Info Index
Protected Peoples Identifying information
Protecting Personally Identifiable Information
Protection Professionally Information Index
Should you sign in on public WIFI?
Yes
No
What are some tips for staying safe online? Select all that apply
Do not overshare
Update everyone constantly about you life
Keep accounts public
Be careful about you accept as a friend
Research apps before downloading
Never log out to save time
What is an example of PPII?
Social Security number
Shoe Size
Breed of your dog
Favorite food
You get a message on Instagram from a new account asking to be your friend?
Accept and talk to them
Block and ignore
What are Ports?
Temporary access to control another computer
Numbers that identify one side of a connection between comp
Universal Plug and play
Access to users account and files remotely
What is Core Networking?
Regular windows services that retrieve data from internet
Numbers that identify one side of a connection between comp
Universal Plug and play
Access to users account and files remotely
What is file and printer sharing?
Universal Plug and play
Access to users account and files remotely
Regular windows services that retrieve data from internet
Numbers that identify one side of a connection between comp
What is Remote assistance?
Numbers that identify one side of a connection between comp
Temporary access to control another computer
Universal Plug and play
Access to users account and files remotely
What is UPnP?
Temporary access to control another computer
Access to users account and files remotely
Universal Plug and play
Numbers that identify one side of a connection between comp
What is file encryption?
Locking files in virtual safe
Putting your computer hard drive in secure location
Controlling access and usage of files
Updating computer password
Will an attacker be able to view an encrypted file?
Yes
No
Which of these are File permissions? (Click all that apply)
Full Control
Low Control
Modify Permissions
Read and Execute permissions
Logistic Permissions
Remark Permissions
Encryption is the same as an antivirus
True
False
(Fill in the blank) One of the major issues that hinders progress in this respect is a massive_______________-with a cybersecurity workforce gap of nearly 2 million, finding a well rounded cyberthreat analyst has become very challenging
Computer shortage
Worker shortage
Talent shortage
Infrastructure shortage
What port is http traffic assigned to?
45
90
60
80
Remote access should always be enabled on your computer.
True
False
When would remote access be useful?
Office job
Accounting
Traveling Jobs
Working on home computer
Public networks are secure
Yes
No
Which are examples of universal plug and play? (UpnP)
Connecting you iphone to airpods
Plugging in a router
Connecting to a printer via wifi
Turning on your TV with a remote
{"name":"Student Workbook Exam", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge about cybersecurity and critical infrastructures with this engaging quiz! Designed to educate students and professionals alike, this quiz covers essential topics related to online safety, phishing, and data protection.25 carefully crafted questionsSelect multiple answers where applicableLearn while you play!","img":"https:/images/course2.png"}
Make your own Survey
- it's free to start.