UNIT II Cyber Security Course

UNIT II Cyber Security Course

University

10 Qs

quiz-placeholder

Similar activities

ภัยคุกคาม

ภัยคุกคาม

University

10 Qs

Quiz ciberseguridad ANDREINA

Quiz ciberseguridad ANDREINA

University

11 Qs

HMS UNIT 2

HMS UNIT 2

University

15 Qs

Technical Quiz (core)

Technical Quiz (core)

University

5 Qs

zoology

zoology

2nd Grade - Professional Development

10 Qs

Civil Engineering Material

Civil Engineering Material

University - Professional Development

15 Qs

Keamanan dan Privasi dalam E-Commerce

Keamanan dan Privasi dalam E-Commerce

University

5 Qs

Inicio de Clases Ciclo Lectivo 2025

Inicio de Clases Ciclo Lectivo 2025

University

10 Qs

UNIT II Cyber Security Course

UNIT II Cyber Security Course

Assessment

Quiz

Education

University

Medium

Created by

mohsin mulla

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Crime that target computers directly

Cyberstalking

Cyberbullying

DOS

Social Engg. Attacks

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Malware is a______________

collection of Interconnected Automated Devices

program that performs cyberstalking

operation conducted in order to gain an information advantage over the opponent.

software designed to harm or exploit any programmable device, service or network.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

___use the Internet to harass an individual, group, or organization.

DOS

Flooding

Cyberstalking/Bullying

Phishing Attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_____is a scam in which fraudsters try to manipulate the victim over the call.

Phishing

Smsing

Vishing

Man in Middle Attack

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

____attack occurs when multiple systems orchestrate a synchronized attack on a single target.

DoS

DDos

Man In Middle

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures for financial gain.

Malware

Social engineering

Scareware

Non of these

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

______ is a social engineering attack whereby a person searches a company's trash to find information that could be used to infiltrate the organization's network

Dumpster Diving

Shoulder Surfing

Piggy backing

Ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?