Chapter 1 quizzes

Chapter 1 quizzes

University

13 Qs

quiz-placeholder

Similar activities

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

SY110 SpAY25 Lesson 1

SY110 SpAY25 Lesson 1

University

8 Qs

J277 - 1.4 - Network Threats

J277 - 1.4 - Network Threats

10th Grade - University

16 Qs

Chapter 13 - Computer Security

Chapter 13 - Computer Security

University

10 Qs

Cybersecurity Ess

Cybersecurity Ess

University

10 Qs

E32WEEK 03

E32WEEK 03

University

10 Qs

Cybersecurity

Cybersecurity

University

11 Qs

305 - DAY 5

305 - DAY 5

University

13 Qs

Chapter 1 quizzes

Chapter 1 quizzes

Assessment

Quiz

Computers

University

Medium

Created by

Kevin Wong

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can an individual build and practice the skills necessary to become a cybersecurity specialist?

Dreaming

Download and run code

Go hiking

Participating in skills competitions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many of the world’s original hackers were computer hobbyists, programmers and students during the 60’s?​

Maybe

False

I don't know

True

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Name ONE main concern of cybersecurity professionals.

vulnerabilities

availabilities

downtime

Threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Palo Alto

Linkedin

Juniper

Cisco

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym IoE represent?

Internet of Everyday

Internet of Everything

Insight into Everything

Intelligence on Everything

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

Algorithm

DDos

Exhaustion

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?