CyberFundamentals Chap3

CyberFundamentals Chap3

University

11 Qs

quiz-placeholder

Similar activities

Tutorial Internet

Tutorial Internet

University

10 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

9th Grade - University

9 Qs

Tema 4 - SI

Tema 4 - SI

University

10 Qs

Gaining access

Gaining access

University

10 Qs

Identifying Security Threats and Vulnerabilities

Identifying Security Threats and Vulnerabilities

University

10 Qs

COMPARTE CON CUIDADO Y NO CAIGAS EN TRAMPAS

COMPARTE CON CUIDADO Y NO CAIGAS EN TRAMPAS

University

15 Qs

Revision 1

Revision 1

University

10 Qs

CyberFundamentals Chap3

CyberFundamentals Chap3

Assessment

Quiz

Computers

University

Medium

Created by

Monarjay Malbog

Used 7+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacks exploit weaknesses in the program such as not validating database queries properly.

Cross-site scripting

Code Injections Attacks

Buffer Overflow

Remote Code Executions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security protocol that attempted to provide a wireless local area network (WLAN) with the same level of security as a wired LAN.

Wired Equivalent Privacy

Rogue Access Points

Cross-site scripting

Denial-of-Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An impersonation attack.

Denial-of-Service (DoS) Attacks

Man-in-the-middle

Spoofing

Sniffing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software program that records or logs the keystrokes of the user of the system.

SMiShing

Grayware

Zero-Day Attacks

Keyboard Logging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack similar to eavesdropping on someone.

Spoofing

Sniffing

Man-in-the-middle

Denial-of-Service (DoS) Attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that attempts to manipulate individuals into performing actions or divulging confidential information.

Social Engineering

 Tailgating

Impersonation

Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Occurs when a criminal tags along with an authorized person to gain entry into a secure location or a restricted area.

Piggybacking and Tailgating

Shoulder Surfing and Dumpster Diving

Impersonation and Hoaxes

Online, Email, and Web-based Trickery

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?