New game
Get Academic Plan

Cyber Shield Quiz

Froggy Jumps

Cybersecurity basics

Download the paper version to play

0 times made

Created by

United Kingdom

Top 10 results

There are still no results for this game. Be the first to stay in the ranking! to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Froggy Jumps

Cyber Shield QuizOnline version

Cybersecurity basics

by Josh Pearson
1

What is the primary purpose of a firewall?

2

What does MFA stand for?

3

Which is a common phishing sign?

4

Which protocol provides encrypted web traffic?

5

What is ransomware?

6

Which is a strong password practice?

7

Which is a secure way to remote into a system?

8

What is social engineering?

9

Which tool helps detect suspicious network activity?

10

What is zero trust security primarily about?

11

Which type of malware hides in legitimate software?

12

What is a DDoS attack?

13

Which practice helps protect data at rest?

14

What is a VPN primarily used for?

15

Which is a strong method of user authentication?

16

What does a security audit involve?

17

Which attack exploits input handling?

18

What is data leakage?

19

Which device should be secured to reduce risk?

20

What is phishing?

21

Which security principle minimizes trusted access?

22

What is a digital signature?

23

Which is a secure way to dispose of data?

24

What does TLS provide?

25

Which password policy is recommended?

26

What is incident response?

27

Which control reduces success of brute force attacks?

28

What is a security patch?

29

Which is a common endpoint security measure?

30

What does data minimization mean?

31

Which term describes data that can't be altered?

32

Which protocol is insecure for remote login?

33

What is a security incident ticket?

34

Which practice improves password security?

35

Which is a threat vector?

36

What does encryption do?

37

Which security model grants access by role?

38

What is a security operation center?

39

Which attack targets passwords through dashboards?

40

What is data backup importance?

41

Which element is part of CIA triad?

42

What is endpoint detection and response?

43

Which is a strong network access control method?

44

What is a security false positive?

45

Which is a phishing-resistant MFA method?

46

What is telemetry in security context?

47

Which is an example of data at rest encryption?

48

What is a man-in-the-middle attack?

49

Which security framework is widely used in enterprises?

50

What is a honeypot in cybersecurity?

51

Which is a common IoT security risk?

52

What does threat modeling do?