Search Header Logo

Cybersecurity Quiz

Authored by Amilcar Asencio III

Computers

12th Grade

Used 5+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "Absolute file path" refer to in cybersecurity?

A) A type of attack where data packets are manipulated in transit

B) The full file path, which starts from the root

C) A network protocol used to determine the MAC address of the next router or device on the path

D) A detection method that identifies abnormal behavior

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "Access controls" in the context of cybersecurity?

A) A set of rules used to solve a problem

B) A type of legitimate software that displays digital advertisements

C) Security controls that manage access, authorization, and accountability of information

D) The investigation and validation of alerts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "Active packet sniffing"?

A) A detection method that identifies abnormal behavior

B) A technique that manipulates AI and ML technology to conduct attacks

C) A type of legitimate software used to display digital advertisements

D) A type of attack where data packets are manipulated in transit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "Address Resolution Protocol (ARP)" stand for?

A) A technique where attackers impersonate customer service representatives on social media

B) A set of rules used to solve a problem

C) A network protocol used to determine the MAC address of the next router or device on the path

D) A detection method that identifies abnormal behavior

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an "Advanced persistent threat (APT)"?

A) A detection method that identifies abnormal behavior

B) An instance when a threat actor maintains unauthorized access to a system for an extended period of time

C) A type of legitimate software that is sometimes used to display digital advertisements

D) A technique where attackers impersonate customer service representatives on social media

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "Adversarial artificial intelligence (AI)"?

A) A detection method that identifies abnormal behavior

B) A technique that manipulates AI and ML technology to conduct attacks more efficiently

C) A network protocol used to determine the MAC address of the next router or device on the path

D) A type of attack where data packets are manipulated in transit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "Adware"?

A) A type of attack where data packets are manipulated in transit

B) A network protocol used to determine the MAC address of the next router or device on the path

C) A type of legitimate software that is sometimes used to display digital advertisements

D) A technique that manipulates AI and ML technology to conduct attacks more efficiently

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?