lesson 5

lesson 5

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz for Associates

Cybersecurity Quiz for Associates

Professional Development

15 Qs

Game of Thrones

Game of Thrones

Professional Development

10 Qs

Mobile legends

Mobile legends

Professional Development

10 Qs

The commander quiz

The commander quiz

Professional Development

11 Qs

Dragon Ball Z Quiz

Dragon Ball Z Quiz

KG - Professional Development

14 Qs

Mini Quiz

Mini Quiz

Professional Development

7 Qs

Pre-test Training IR and Hands On Lab - Telkomsigma

Pre-test Training IR and Hands On Lab - Telkomsigma

Professional Development

10 Qs

Cyber Safe

Cyber Safe

Professional Development

10 Qs

lesson 5

lesson 5

Assessment

Quiz

Other

Professional Development

Medium

Created by

CARLO SANTUICO

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What term describes a type of malicious software designed to block access to a computer system until a sum of money is paid?

virus

trojan

ransomware

worm

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

WWhich of the following is NOT a common type of malware?

spyware

firewall

adware

rootkit

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following best describes a Trojan horse?

A type of malware that spreads rapidly through a network

Malicious software that encrypts files and demands payment for decryption

Software that disguises itself as legitimate but contains harmful code

A form of malware that steals sensitive information

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the primary purpose of a firewall?

To detect and remove malware from a computer system

To prevent unauthorized access to a network or computer system

To encrypt data transmissions over a network

To back up important files and folders

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What type of malware is specifically designed to monitor and record user activities on a computer?

Spyware

Worm

rootkit

Adware

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Which of the following is an example of a social engineering attack?

SQL injection

Distributed Denial of Service (DDoS)

Phishing

Cross-site scripting (XSS)

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What is the term for a cybersecurity attack in which an attacker attempts to gain unauthorized access to a system by repeatedly guessing passwords?

Brute force attack

Man-in-the-middle attack

Buffer overflow attack

Denial of Service (DoS) attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?