iRakshak

iRakshak

University

10 Qs

quiz-placeholder

Similar activities

EDUC 108: Module 3 Quiz

EDUC 108: Module 3 Quiz

University

15 Qs

Group A_Danone

Group A_Danone

University - Professional Development

10 Qs

Post Test Sitosin 2022

Post Test Sitosin 2022

University

10 Qs

Thompson ch 9

Thompson ch 9

University

10 Qs

GSC-EXAMEN T4: PREMIOS INTER'LES Y NAC'LES

GSC-EXAMEN T4: PREMIOS INTER'LES Y NAC'LES

University

15 Qs

Istilah Online

Istilah Online

12th Grade - University

10 Qs

GK & Education 28.05.2020

GK & Education 28.05.2020

University

10 Qs

EC8691 - MICROPROCESSORS AND MICROCONTROLLERS

EC8691 - MICROPROCESSORS AND MICROCONTROLLERS

University

10 Qs

iRakshak

iRakshak

Assessment

Quiz

Education

University

Hard

internet

Standards-aligned

Created by

Cyber Security RCE

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does the acronym "VPN" stand for?
Virtual Private Network
Very Private Network
Virtual Personal Network
Visual Private Network

Tags

internet

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT considered a strong password practice?
Using a combination of uppercase and lowercase letters
Using easily guessable information like birthdays or names
Including special characters and numbers
Creating a long and complex password

Tags

internet

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of a firewall in cybersecurity?
To protect against physical theft
To prevent unauthorized access to or from a private network
To detect and remove viruses from a computer
To secure email communications

Tags

internet

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary goal of phishing attacks?
To gain unauthorized access to computer systems
To spread awareness about cybersecurity
To provide educational information about online safety
To enhance network performance

Tags

internet

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of attack involves overwhelming a system with a flood of traffic in order to make it unavailable to users?
Phishing attack
DDoS (Distributed Denial of Service) attack
Man-in-the-Middle attack
SQL injection attack

Tags

internet

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which encryption protocol is commonly used to secure web traffic?
WPA
SSL/TLS
HTTPS
IPsec

Tags

internet

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of two-factor authentication (2FA)?
To use two different devices for authentication
To require two different passwords for access
To add an extra layer of security by requiring two forms of identification
To authenticate users on two different networks

Tags

internet

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?