Quiz on Cyber Security

Quiz on Cyber Security

Professional Development

15 Qs

quiz-placeholder

Similar activities

Battle of the BAU

Battle of the BAU

Professional Development

15 Qs

IYMUN: Theme and AKDN

IYMUN: Theme and AKDN

Professional Development

10 Qs

Kuleanpay

Kuleanpay

Professional Development

15 Qs

Day 1 - Refresher Training (Essential to Stock Market)

Day 1 - Refresher Training (Essential to Stock Market)

Professional Development

10 Qs

bootcamp1

bootcamp1

Professional Development

10 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

INFOSEC WEEK DAY 2

INFOSEC WEEK DAY 2

Professional Development

10 Qs

Insider Threats Quiz

Insider Threats Quiz

Professional Development

15 Qs

Quiz on Cyber Security

Quiz on Cyber Security

Assessment

Quiz

Other

Professional Development

Hard

Created by

charan patcha

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Network Security

Database Security

Information Security

Physical Security

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following information security technology is used for avoiding browser-based hacking?

Anti-malware in browsers

Remote browser access

Adware remover in browsers

Incognito mode in a browser

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______ technology is used for analyzing and monitoring traffic in network and information flow.

Cloud access security brokers (CASBs)

Managed detection and response (MDR)

Network Security Firewall

Network traffic analysis (NTA)

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.

security officer

malicious hacker

security auditor

network analyst

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?

Rootkits

Backdoors

Trojans

Wireshark

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following typically keeps tabs on every online activity the victim engages in, compiles all the data in the background, and sends it to a third party? 

  1. Adware

  1. Malware

Spyware

All of the above 

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What kind of malware does not replicate or clone itself through infection? 

Rootkits 

Worms 

Viruses

Trojans

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?