Cybersecurity Fundamentals Week 1 Quiz

Cybersecurity Fundamentals Week 1 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

ICT final revision

ICT final revision

8th Grade

13 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

TECH TRAIL BLAZERS

TECH TRAIL BLAZERS

5th Grade

12 Qs

Chapter 1 quizzes

Chapter 1 quizzes

University

13 Qs

Understanding Cyber Security Targets and Incidents

Understanding Cyber Security Targets and Incidents

KG - University

13 Qs

Cyber Security

Cyber Security

12th Grade

10 Qs

Computer Science

Computer Science

6th Grade

11 Qs

Unit 7-Cybersecurity

Unit 7-Cybersecurity

9th Grade

12 Qs

Cybersecurity Fundamentals Week 1 Quiz

Cybersecurity Fundamentals Week 1 Quiz

Assessment

Quiz

Computers

KG - University

Easy

Created by

Marcus Phang

Used 63+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Cisco

Juniper

Linkedin

Palo Alto

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym IoE represent?

Internet of Everyday

Internet of Everything

Insight into Everything

Intelligence on Everything

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

algorithm

DDoS

exhaustion

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DoS

spoof

DDoS

ping sweep

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Name 1 types of records that cyber criminals would be interested in stealing from organizations.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

changing operating systems

establishing early warning systems

sharing cyber Intelligence information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?