
Cybersecurity Essentials

Quiz
•
Computers
•
University
•
Easy
S. Lestariningati
Used 1+ times
FREE Resource
43 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes a motivation of hacktivists?
They are trying to show off their hacking skills.
They are interested in discovering new exploits.
They are curious and learning hacking skills.
They are part of a protest group behind a political cause.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information?
white hat hackers
black hat hackers
gray hat hackers
script kiddies
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?
SHS
Vlans
RAID
VPN
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of networks poses increasing challenges to cybersecurity specialists due to the growth of BYOD on campus?
Wireless networks
wired networks
sneaker net
virtual networks
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity specialist is working with the IT staff to establish an effective information security plan. Which combination of security principles forms the foundation of a security plan?
confidentiality, integrity, and availability
technologies, policies, and awareness
secrecy, identify, and nonrepudiation
encryption, authentication, and identification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?
man in the middle attack
ransomware
Trojan horse
DoS attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes a distributed denial of service attack?
An attacker sends an enormous quantity of data that a server cannot handle.
An attacker builds a botnet comprised of zombies.
An attacker views network traffic to learn authentication credentials.
One computer accepts data packets based on the MAC address of another computer.
Create a free account and access millions of resources
Similar Resources on Wayground
45 questions
Quiz 4 - Chapter 7 - IT 104A

Quiz
•
University
40 questions
Komputer Akuntansi Kelas XI AK

Quiz
•
KG - Professional Dev...
42 questions
network

Quiz
•
University
40 questions
First QUIZ of Database - Edited by: Eng. Javier Daza 2023-1

Quiz
•
University
40 questions
DCCN-Chapt-2 - Quiz

Quiz
•
University
40 questions
Revision #1 - TWIMH

Quiz
•
University
45 questions
CIT_210_Test_1_Review

Quiz
•
University
45 questions
CSC 308 ISA MIDTERM EXAM

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University