CPE315 Module 6

CPE315 Module 6

University

9 Qs

quiz-placeholder

Similar activities

Gamble CompSec Allies

Gamble CompSec Allies

University

10 Qs

Session and Spoofing

Session and Spoofing

University

10 Qs

Data Security

Data Security

University

4 Qs

Cyber Security Quiz: Protect and Analyse

Cyber Security Quiz: Protect and Analyse

University

10 Qs

CyberSecurity Pertemuan ke-5

CyberSecurity Pertemuan ke-5

University

13 Qs

Cyber Security QUIZ

Cyber Security QUIZ

University

10 Qs

Computer Protection

Computer Protection

University

10 Qs

Cyberthreats

Cyberthreats

University

10 Qs

CPE315 Module 6

CPE315 Module 6

Assessment

Quiz

Computers

University

Medium

Created by

Monarjay Malbog

Used 4+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network.

Trojan Horse

Worm

Adware

Ransom ware

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware typically displays annoying pop-ups to generate revenue for its author?

Adware

Ransomware

Scareware

phishing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware encrypts all data on a drive and demands payment in Bitcoin cryptocurrence to unencrypt the files?

Phishing

Scareware

Ransomware

Trojan Horse

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware attempts to convince people to divulge their personally identifable information (PII)?

phishing

rootkit

ransomware

trojan horse

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which is an example of social engineering?

a computer displaying unauthorized pop-ups and adware

an anonymous programmer directing a DDOS attack on a data center

the infection of a computer by a virus carried by a Trojan

an unidentified person claiming to be a technician collecting user information from employees

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which access attack method involves a software program that attempts to discover a system password by the use of an electronic dictionary?

Denial of Service Attack

Buffer Overflow Attack

Port Redirection Attack

Brute-Force Attack

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a reconnaissance attack on a computer network?

To gather information about the target network and system

To redirect data traffic so that it can be monitored

To prevent users from accessing network resources

To steal data from the network servers

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

To which category of security attacks does man-in-the-middle belong?

Social Engineering

Reconnaissance

Access

DoS

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is used to provide a list of open ports on network devices?

NMAP

Tracert

Ping

Whois