Cyber Security - Learning Tales

Cyber Security - Learning Tales

Professional Development

10 Qs

quiz-placeholder

Similar activities

Introduction to Cybersecurity

Introduction to Cybersecurity

Professional Development

6 Qs

lesson 5

lesson 5

Professional Development

10 Qs

Solving cases with OSINT

Solving cases with OSINT

Professional Development

10 Qs

ESET Post Training Assessment 2023

ESET Post Training Assessment 2023

Professional Development

15 Qs

Lab Instruction Focused Book Study

Lab Instruction Focused Book Study

Professional Development

12 Qs

09 Reinforced Concrete Structures

09 Reinforced Concrete Structures

Professional Development

15 Qs

Evaluación Seguridad de la información y Ciberseguridad

Evaluación Seguridad de la información y Ciberseguridad

Professional Development

11 Qs

Cyber Security - Learning Tales

Cyber Security - Learning Tales

Assessment

Quiz

Other

Professional Development

Hard

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How does malware get onto your computer?

Email attachments or links


On USB sticks

By visiting insecure websites

All the options

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is an example of a “phishing” attack?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.

Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information.

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.

All of the above.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.

Antivirus

Firewall

Vlc player

Script

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is considered as the unsolicited commercial email?

Virus

Malware

Spam

All of the above

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

As a security manager, how would you explain the primary goal of a security awareness program to senior management? (Information Security & Risk Management Domain)

Provide a vehicle for communicating security procedures

Provide a clear understanding of potential risk and exposure

Provide a forum for disclosing exposure and risk analysis

Provide a forum to communicate user responsibilities

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

________________ is the process of recovering passwords from data that have been stored in or transmitted by a computer system ?

Network cracking

Password cracking

System cracking

Phishing

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of this is an example of physical hacking?

Remote Unauthorised access

Inserting malware loaded USB to a system

SQL Injection on SQL vulnerable site

DDoS (Distributed Denial of Service) attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?