Search Header Logo

Cybersecurity Quiz

Authored by Cynthia Stepp

Computers

12th Grade

Used 1+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

47 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Denial of Service (DoS) attack?

An attack where a machine is sent more requests than it can handle, blocking legitimate system access by reducing system availability.

An attack where an attacker gains unauthorized access to information.

An attack where an unknown person executes commands on a server.

An attack where the attacker changes entries in a record.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Distributed Denial of Service (DDoS) attack?

An attack where a machine is sent more requests than it can handle.

An attack involving multiple computers sending requests, usually performed by a botnet.

An attack where an attacker gains unauthorized access to information.

An attack where the attacker deletes files which can impact computing capability.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Unauthorized Access allow an attacker to do?

Send more requests than a machine can handle.

Gain access to information they should not have.

Execute commands on a server.

Change entries in a record.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Executing Commands Illicitly?

An attack where a machine is sent more requests than it can handle.

An attack where an attacker gains unauthorized access to information.

An attack where an unknown or untrusted person executes commands on a server.

An attack where the attacker deletes files which can impact computing capability.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Data Diddling?

An attack where a machine is sent more requests than it can handle.

An attack where the attacker changes entries in a record.

An attack where an unknown or untrusted person executes commands on a server.

An attack where the attacker deletes files which can impact computing capability.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Data Destruction?

An attack where a machine is sent more requests than it can handle.

An attack where the attacker changes entries in a record.

An attack where an unknown or untrusted person executes commands on a server.

An attack where the attacker deletes files which can impact computing capability.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Social Engineering?

A non-technical or low technology confidence trick often involving trickery or fraud.

A technical method to gain unauthorized access to a system.

A method to execute commands on a server.

A method to change entries in a record.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?