Cyber Threats Beginner Quiz 2
Select your answers and check your results. Use Reset to start again.
Search
Practice Pronunciation (Merriam-Webster)
Navigation
IP Addressing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Address Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quiz 2
1. What is a "Trojan Horse" in computing?
Malware disguised as a legitimate or useful piece of software
A physical statue used to hide a router in an office
A type of computer shaped like an animal for decoration
2. What is "Shoulder Surfing"?
An exercise done while sitting in front of a monitor
Looking at a website about ocean surfing on a laptop
Looking over someone's shoulder to see their screen or password
3. What is an "Adware" infection?
Software that helps you create ads for your business
Malware that automatically displays unwanted advertisements
A program that hides all ads on a website
4. What is "Dumping" (or Dumpster Diving) in security?
Searching through trash to find sensitive documents
Deleting all files on a drive before throwing it away
Cleaning a computer case using a high-pressure hose
5. What is a "Botnet"?
A group of robots built to help people clean houses
A type of net used to catch bugs in a datacenter
A network of infected computers controlled by an attacker
6. What is "Vulnerability"?
The total number of files stored on a computer
A weakness or flaw in a system that could be used by an attacker
A way to make a computer program run faster
7. What is "Encryption" used for?
Converting information into code to prevent unauthorized access
Changing text color on a screen to make it look nicer
Making a file larger so it takes up more hard drive space
8. What is a "Security Patch"?
A physical sticker put over a camera to stop watching
A bandage used for cuts from sharp computer parts
An update to a program that fixes a known security vulnerability
9. What is "HTTPS"?
A way to name a website so it is easy to find
A secure version of the protocol used to send data over the internet
A keyboard with extra keys for security tools
10. What is a "Data Breach"?
An incident where sensitive data is viewed or stolen
Cleaning a hard drive using a specialized type of soap
A situation where a screen breaks into small pieces
Previous
Check Quiz
Reset
Next
Other
Timer
00:00
Start
Stop
Reset
Vocabulary Quiz
Score: 0
Reset Score
Submit Answer
Next Word
Spin the Wheel
SPIN
Promo's
Explore More
Cisco Certifications
Cisco Learning Network