
Cybersecurity Essentials
Authored by S. Lestariningati
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
43 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes a motivation of hacktivists?
They are trying to show off their hacking skills.
They are interested in discovering new exploits.
They are curious and learning hacking skills.
They are part of a protest group behind a political cause.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information?
white hat hackers
black hat hackers
gray hat hackers
script kiddies
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?
SHS
Vlans
RAID
VPN
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of networks poses increasing challenges to cybersecurity specialists due to the growth of BYOD on campus?
Wireless networks
wired networks
sneaker net
virtual networks
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity specialist is working with the IT staff to establish an effective information security plan. Which combination of security principles forms the foundation of a security plan?
confidentiality, integrity, and availability
technologies, policies, and awareness
secrecy, identify, and nonrepudiation
encryption, authentication, and identification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?
man in the middle attack
ransomware
Trojan horse
DoS attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes a distributed denial of service attack?
An attacker sends an enormous quantity of data that a server cannot handle.
An attacker builds a botnet comprised of zombies.
An attacker views network traffic to learn authentication credentials.
One computer accepts data packets based on the MAC address of another computer.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
48 questions
OSI Layer
Quiz
•
12th Grade - University
45 questions
Luyện tập trắc nghiệm MS Word 2016 (Bài 02)
Quiz
•
University
40 questions
Latihan ganjil
Quiz
•
9th Grade - University
40 questions
Nerds quiz
Quiz
•
University
45 questions
Computer memory
Quiz
•
University
42 questions
TIN HỌC KHỐI 5 HK1
Quiz
•
1st Grade - University
44 questions
ACO.C1.HTTT
Quiz
•
University
46 questions
CompTIA ITFundamentals CRAM
Quiz
•
6th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade