UNIT II Cyber Security Course

UNIT II Cyber Security Course

University

10 Qs

quiz-placeholder

Similar activities

KANTIN PART 2

KANTIN PART 2

University

10 Qs

Sigurnost na internetu

Sigurnost na internetu

1st Grade - Professional Development

10 Qs

Tutorial 8 Security

Tutorial 8 Security

University

15 Qs

Trò chơi ôn tập-MIS-Nhóm 7

Trò chơi ôn tập-MIS-Nhóm 7

University

10 Qs

Vaccine and Immunization Class (9)

Vaccine and Immunization Class (9)

KG - Professional Development

10 Qs

Review

Review

University

13 Qs

HI-5 2631

HI-5 2631

University

15 Qs

Internetna varnost za študente - pojmi

Internetna varnost za študente - pojmi

University

11 Qs

UNIT II Cyber Security Course

UNIT II Cyber Security Course

Assessment

Quiz

Education

University

Medium

Created by

mohsin mulla

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Crime that target computers directly

Cyberstalking

Cyberbullying

DOS

Social Engg. Attacks

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware is a______________

collection of Interconnected Automated Devices

program that performs cyberstalking

operation conducted in order to gain an information advantage over the opponent.

software designed to harm or exploit any programmable device, service or network.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

___use the Internet to harass an individual, group, or organization.

DOS

Flooding

Cyberstalking/Bullying

Phishing Attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____is a scam in which fraudsters try to manipulate the victim over the call.

Phishing

Smsing

Vishing

Man in Middle Attack

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

____attack occurs when multiple systems orchestrate a synchronized attack on a single target.

DoS

DDos

Man In Middle

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures for financial gain.

Malware

Social engineering

Scareware

Non of these

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

______ is a social engineering attack whereby a person searches a company's trash to find information that could be used to infiltrate the organization's network

Dumpster Diving

Shoulder Surfing

Piggy backing

Ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?