cyber security

cyber security

University

15 Qs

quiz-placeholder

Similar activities

Internet Basics

Internet Basics

University

15 Qs

TCP256 Finals Quiz 1

TCP256 Finals Quiz 1

University

20 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

IAS 101 - Activity 3

IAS 101 - Activity 3

University

20 Qs

Switching and Routing

Switching and Routing

University

10 Qs

Fundamentals 18 Understanding DDoS Attacks

Fundamentals 18 Understanding DDoS Attacks

9th Grade - University

20 Qs

Computer Fundamentals

Computer Fundamentals

University

10 Qs

cyber security

cyber security

Assessment

Quiz

Computers

University

Hard

Created by

Ragini Sharma

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a phases of planning a cybercrime

Scanning and scrutinizing

Coding

Reconnaissance

Launching an attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The type of attack, where the hacker pretends to be a VIP or high-level manager who has the authority to use computer systems or files

Impersonating an employee or valid user

Posing as an important user

Using a third person

Calling technical support

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is the technique of gathering passwords by watching over a person’s shoulder while they log in to the system.

Fake E-mails

Baiting

Shoulder Surfing

Dumpster

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is an attack/threat that exploits a previously unknown vulnerability in a computer application or operating system, one that developers have not had time to address and patch.

On launch attack

Vulnerability attack

Hack attack

Zero-day attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Google Apps is an example of:

Infrastructure -as -a -service(IaaS)

Platform -as -a -service(PaaS)

Application-as-a-service(AaaS)

Software-as-a-service(SaaS)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is notorious art of breaking into phone or other communication systems.

Hacking

Cracking

Phreaking

Communicating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____is one who thinks before acting or committing a malice or non-malice deed.

Black Hat

White Hat

Blue Hat

Brown Hat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?