Cyber Threats Beginner Quiz 5
Select your answers and check your results. Use Reset to start again.
Search
Practice Pronunciation (Merriam-Webster)
Navigation
IP Addressing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Address Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quiz 5
1. What is a "Scam"?
A computer printer that is very fast at printing long documents
A scheme used to trick someone out of money or information
A way to scan a photo and save it on your computer as a digital file
2. What is "Cyberbullying"?
Using digital technology to harass, threaten, or humiliate someone
A game where you play as a bull that is running through a large city
Hiring a person to help you write mean comments on a website post
3. What is "Privacy Settings"?
A book that tells you how to keep your house safe from intruders
A button you press to turn off your computer and the monitor screen
Controls on an app or site that let you decide what others can see
4. What is a "Malicious Link"?
A chain made of metal that is used to lock a server rack in an office
A website address that, when clicked, installs malware or steals data
A way to connect two different computers using a long network cable
5. What is "Hoax"?
A humorous or malicious deception intended to trick a group of people
A type of bird known for having very large and sharp claws
A way to clean a computer case by using a specialized vacuum tool
6. What is "Credential Stuffing"?
Putting too many files into a folder until the computer crashes
A type of food served during a holiday dinner at a tech office
Using stolen login info to try and gain access to many other accounts
7. What is "Pop-up" risk?
A toaster that pops up bread too fast and makes it fall on the floor
Windows that appear on a site and may contain malware or fake alerts
A computer game where you have to pop as many bubbles as you can
8. What is "Backup"?
A copy of files stored in a separate location for recovery if lost
Walking backwards out of a server room so you don't trip on wires
A special computer chair that provides extra support for your back
9. What is "Software Piracy"?
A type of computer game where you play as a pirate on a ship
On a boat while you are using a laptop to write a new computer app
The illegal copying, distribution, or use of copyrighted software
10. What is a "Suspicious Email"?
An email sent to you by your boss asking for a report by Friday
An email with unexpected links or files from an unknown sender
A message from a friend that says they are going on vacation
Previous
Check Quiz
Reset
Next
Other
Timer
00:00
Start
Stop
Reset
Vocabulary Quiz
Score: 0
Reset Score
Submit Answer
Next Word
Spin the Wheel
SPIN
Promo's
Explore More
Cisco Certifications
Cisco Learning Network