Quiz 2

Quiz 2

University

16 Qs

quiz-placeholder

Similar activities

Social Engineering

Social Engineering

University

15 Qs

STUXNET

STUXNET

12th Grade - University

20 Qs

Deltarune (chapters 1&2)

Deltarune (chapters 1&2)

7th Grade - University

15 Qs

SOAL PTS (Si)

SOAL PTS (Si)

University

19 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

14 Qs

SR 101 - MIDTERM QUIZ

SR 101 - MIDTERM QUIZ

University

15 Qs

Cyber Hygiene

Cyber Hygiene

University

15 Qs

The Sonic The Hedgehog Quiz

The Sonic The Hedgehog Quiz

University

14 Qs

Quiz 2

Quiz 2

Assessment

Quiz

Other

University

Medium

Created by

Angelo Bri�as

Used 1+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What team color is this skill requirement included "Good relationship with other tech teams."?

Blue

Red

Purple

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What team color is this skill requirement included "Clear and concise communication is essential for conveying technical insights, vulnerabilities, and defensive strategies to both offensive and defensive teams."?

Blue

Red

Purple

3.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

What type of cyber attack is like fishing with a tricky lure?

Ransomware

Phishing

DDOS Attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

It is a tactic used by cyber attackers to manipulate people into divulging sensitive information or performing actions that compromise security.

Reverse Psychology

Social Engineering

Psychological Engineering

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What team color provides detection & response, forensics, malware analysis, monitoring, threat intelligence, threat hunting

Blue

Red

Purple

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What team color is this skill requirement included "Effective communication is essential for conveying findings, recommendations, and risks to stakeholders."?

Blue

Red

Purple

7.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

What type of cyber attack are like traffic jams on the internet?

Phishing

Ransomware

DDOS Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?