ASG -01

ASG -01

10 Qs

quiz-placeholder

Similar activities

Level 3 - Network Topologies

Level 3 - Network Topologies

KG - University

8 Qs

Cybersecurity quiz

Cybersecurity quiz

6th - 8th Grade

10 Qs

Marketing Information Management Quiz

Marketing Information Management Quiz

KG - University

11 Qs

East and Southeast Asia Culture Quiz

East and Southeast Asia Culture Quiz

KG - University

14 Qs

Level 3 - Network Port and Protocols Quiz

Level 3 - Network Port and Protocols Quiz

KG - University

13 Qs

Vocab Quiz #1: Scientific Concepts 1

Vocab Quiz #1: Scientific Concepts 1

7th Grade

15 Qs

Y6 - Data - Introduction to Spreadsheets Assessment NCCE

Y6 - Data - Introduction to Spreadsheets Assessment NCCE

6th Grade - University

11 Qs

ASG -01

ASG -01

Assessment

Quiz

others

Hard

Created by

Cloud Upskill

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of cybersecurity threat?
Malware
Social engineering
Denial of Service (DoS)
Physical security breach

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a vulnerability in a computer system?
Weak passwords
Firewall protection
Data encryption
Antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common type of cyber attack?
Physical theft of computers
Phishing
Password guessing
Denial of Service (DoS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of confidentiality in cybersecurity?
Protecting data from unauthorized access or disclosure
Ensuring data is accurate and reliable
Ensuring data is available when needed
Protecting data from modification or destruction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of integrity in cybersecurity?
Protecting data from unauthorized access or disclosure
Ensuring data is accurate and reliable
Ensuring data is available when needed
Protecting data from modification or destruction

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of availability in cybersecurity?
Protecting data from unauthorized access or disclosure
Ensuring data is accurate and reliable
Ensuring data is available when needed
Protecting data from modification or destruction

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Distributed Denial of Service (DDoS) attack?
A type of hacking that targets network vulnerabilities
A type of social engineering attack
A type of malware that encrypts files and demands payment for decryption
An attack that floods a network with traffic from multiple sources, making it unavailable

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?