Intro to Cybersecurity Part 1

Intro to Cybersecurity Part 1

10th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

E-Ethics Quiz

E-Ethics Quiz

12th Grade

15 Qs

Keamanan Jaringan

Keamanan Jaringan

11th Grade

10 Qs

Tes Harian 1 Administrasi Sistem Jaringan

Tes Harian 1 Administrasi Sistem Jaringan

12th Grade

11 Qs

Discord Quiz

Discord Quiz

5th - 12th Grade

10 Qs

Pressure and Density

Pressure and Density

KG - Professional Development

10 Qs

Module 6: Securing Cloud Resources

Module 6: Securing Cloud Resources

9th - 12th Grade

10 Qs

SUB-TOPIC HACKING

SUB-TOPIC HACKING

10th Grade

10 Qs

Grade 11 CSC

Grade 11 CSC

11th Grade

10 Qs

Intro to Cybersecurity Part 1

Intro to Cybersecurity Part 1

Assessment

Quiz

Other

10th - 12th Grade

Hard

Created by

Ms. Nennig

Used 30+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an attack surface?

An area that can be hacked on a network.

When a business creates virtual machines and forgets or ignores them.

On a web server that is not indexed by search engines.

It routes traffic through a multitude of networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker that uses pre-made tools to conduct attacks is known as which type of hacker?

Script kiddie

Onion network

Red Team

Hypervisor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you want to remain anonymous on the Internet, what manages the traffic flow?

Onion network (or Tor browser)

Script kiddie

Hyper-V

Create a snapshot.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker motivated by personal beliefs is practicing what type of hacking?

Hacktivism

Red Team

Hypervisor

Hacking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the team called that is hired or used to assess the security of a company?

Red Team

Hacktivism

Go Team

Fortnite

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

There is a database that a company wants to allow preregistered, selected customers to access. It does not want the database publicly advertised. Which is the best solution for the location of the database?

In a hidden folder on the company’s normal web server

On the darknet

On a web server that is not indexed by search engines

On a company server that is not a web server

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Information assurance primarily deals with _____.

laws associated with computer hacking

management of the security of a network

protecting the data and assets of an organization

securing web servers from unknown hackers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?