1) What is the main purpose of cyber threats? a) Improve system efficiency b) Compromise data security c) Enhance user experience d) Speed up internet 2) Which is a common type of cyber crime? a) Online gaming b) Music streaming c) Identity theft d) Video editing 3) What is a typical outcome of computer crimes? a) Improved software b) Financial damage c) Faster networks d) Better user support 4) Which virus replicates itself across networks? a) Trojan b) Adware c) Spyware d) Worm 5) What do hackers often aim to do? a) Breach system security b) Provide free updates c) Fix software bugs d) Design websites 6) What is a key function of anti-virus software? a) Play music b) Detect and remove malware c) Edit photos d) Browse the web 7) What enhances online banking security? a) Public Wi-Fi b) Encryption c) Weak passwords d) Old devices 8) What is a primary cloud security risk? a) Fast data transfer b) High storage capacity c) Unauthorized access d) Unlimited bandwidth 9) Which company is known for cyber security solutions? a) Amazon b) Netflix c) McAfee d) Spotify 10) Who typically works as a cyber security expert? a) Chef b) Security consultant c) Teacher d) Driver 11) What is a predicted future cyber threat? a) Slower networks b) Quantum computing attacks c) Better firewalls d) Free software 12) Which threat is considered outdated? a) DDoS attacks b) AI-based threats c) Phishing d) Malware 13) What is an effective preventive measure? a) Ignoring security alerts b) Using public PCs c) Sharing login details d) Regular software updates 14) How do AI-run cyber attacks differ? a) They adapt to defenses b) They are slower c) They are less common d) They require manual input 15) What is a sign of a cyber threat? a) Faster computer speed b) Unusual account activity c) New software updates d) Increased storage 16) Which crime involves stealing credentials? a) Credential stuffing b) Vandalism c) Online shopping d) Video calls 17) What punishment do convicted hackers face? a) Free training b) Imprisonment c) Job promotion d) Vacation 18) Which virus hides in legitimate programs? a) Worm b) Trojan horse c) Ransomware d) Spyware 19) What skill do hackers often possess? a) Programming b) Cooking c) Painting d) Dancing 20) What does anti-virus software scan for? a) Music files b) Malicious code c) Video clips d) Text documents 21) What secures online banking transactions? a) Secure sockets layer (SSL) b) Unencrypted data c) Open networks d) Old hardware 22) What is a cloud security challenge? a) Too much space b) Data encryption issues c) Fast downloads d) Easy access 23) Which company offers cyber security tools? a) Facebook b) Norton c) Twitter d) Instagram 24) What does a cyber security expert analyze? a) Weather patterns b) Network vulnerabilities c) Cooking recipes d) Sports statistics 25) What is a future cyber threat trend? a) IoT device attacks b) Manual hacking c) Faster browsers d) Better antivirus 26) Which protection is outdated? a) Firewalls b) Password-only security c) Encryption d) Multi-factor authentication 27) How do AI attacks improve over time? a) They learn from defenses b) They become slower c) They require more humans d) They decrease in number 28) What is a common cyber crime tactic? a) Sending legitimate emails b) Social engineering c) Providing free updates d) Offering discounts 29) What tool helps prevent hacking? a) Intrusion detection system b) Calculator c) Notepad d) Camera 30) How can cyber security knowledge be improved? a) Ignoring new threats b) Attending training c) Using old methods d) Avoiding updates
0%
Information security
공유
공유
공유
만든이
Zagaru331
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?