Cybersecurity 2

Cybersecurity 2

12th Grade

11 Qs

quiz-placeholder

Similar activities

Introduction to HTML/CSS Quiz 4: Advanced HTML

Introduction to HTML/CSS Quiz 4: Advanced HTML

6th - 12th Grade

7 Qs

Masterclass

Masterclass

12th Grade

8 Qs

Computer Hardware - Cache Memory

Computer Hardware - Cache Memory

4th - 12th Grade

10 Qs

Unit 3 - 2.3.1 Application Vulnerabilitites

Unit 3 - 2.3.1 Application Vulnerabilitites

9th Grade - University

6 Qs

Cyber Security

Cyber Security

12th Grade - Professional Development

8 Qs

02 Binary Arithmetic

02 Binary Arithmetic

9th - 12th Grade

15 Qs

Unit 3 - 2.4.12 Application Attacks Part 2

Unit 3 - 2.4.12 Application Attacks Part 2

9th Grade - University

7 Qs

Google Sheets - Level 1

Google Sheets - Level 1

5th - 12th Grade

15 Qs

Cybersecurity 2

Cybersecurity 2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Knight Brandon

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for individuals who break into computer systems with their technical knowledge?

White Hats

Black Hats

Cybercriminals

Hacktivists

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common type of attack used in social engineering?

Phishing

Pretexting

Trojan horses

Buffer overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a trojan horse in a social engineering attack?

Promote a social or political goal

Steal data

Encrypt files

Force entry into a system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the method used to gain access to a computer system by trying every combination of password until entry is gained?

Exploit

Brute force

Code injection

Buffer overflow

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for a bug in a system that is successfully utilized to gain capabilities or access?

Buffer overflow

Code injection

Exploit

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of bounds checking in combating buffer overflow attacks?

Randomize memory location of variables

Inject purposeful new values into a program’s memory

Test the length of input before copying it into a buffer

Leave unused space after buffers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common type of attack used to exploit websites that use databases?

Brute force

Code injection

Phishing

Buffer overflow

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?