CyberSecurity

CyberSecurity

Professional Development

13 Qs

quiz-placeholder

Similar activities

OSI Model

OSI Model

University - Professional Development

18 Qs

AZ-900 Practice Test 8

AZ-900 Practice Test 8

Professional Development

17 Qs

Part 5.4

Part 5.4

Professional Development

15 Qs

Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

Networking Fundamentals - Quiz 1 - Winter 2024

Networking Fundamentals - Quiz 1 - Winter 2024

Professional Development

10 Qs

Troubleshooting Level 1

Troubleshooting Level 1

Professional Development

15 Qs

Security+ Study Guide-02 Understanding Identity & Access Mgnt

Security+ Study Guide-02 Understanding Identity & Access Mgnt

Professional Development

15 Qs

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

CyberSecurity

CyberSecurity

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Patrick Mahasha

Used 8+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of hacker is one who intends to do harm?

Grey Hat

White Hat

Black Hat

Hacker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a firewall in a cybersecurity context?

To prevent physical access to a computer.

To block all incoming and outgoing network traffic.

To monitor and control network traffic based on a set of security rules.

To encrypt all data on a computer.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is a cyberattack method that involves tricking individuals into revealing sensitive information through deceptive emails or websites.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of Malware is this:

Transnet has been hacked through a Denial of Service attack , the hackers want money in crypto to allow Transet to resume operations.

Adware

Spyware

Ransomware

Malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of two-factor authentication (2FA)?

Using a username and password to log in.

Using a fingerprint scan and a retinal scan to log in.

Using a smart card and a PIN to log in.

Using a CAPTCHA to log in.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main goal of a DDoS (Distributed Denial of Service) attack?


To steal sensitive data from a computer .

To overload a network or website with traffic, making it unavailable to users.

To gain unauthorized access to a computer system.

To spread malware to multiple devices.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption protocol is commonly used to secure web traffic by ensuring data confidentiality and integrity?

HTTPS

FTP

SMTP

SNMP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?