Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

47 Qs

quiz-placeholder

Similar activities

NetAcad Quiz Questions

NetAcad Quiz Questions

11th Grade - University

48 Qs

APCSP Review

APCSP Review

9th - 12th Grade

45 Qs

Cybersecurity Social Engineering Techniques & Facts By Mr. B

Cybersecurity Social Engineering Techniques & Facts By Mr. B

12th Grade

50 Qs

IT Networking Certification

IT Networking Certification

11th Grade - University

45 Qs

Their Networking Certification

Their Networking Certification

11th Grade - University

45 Qs

Network Plus

Network Plus

11th Grade - University

45 Qs

Comptia Prep 1

Comptia Prep 1

12th Grade

50 Qs

Quiz on The Internet & Its Uses (Ch. 5)

Quiz on The Internet & Its Uses (Ch. 5)

12th Grade

44 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Cynthia Stepp

Used 1+ times

FREE Resource

47 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Denial of Service (DoS) attack?

An attack where a machine is sent more requests than it can handle, blocking legitimate system access by reducing system availability.

An attack where an attacker gains unauthorized access to information.

An attack where an unknown person executes commands on a server.

An attack where the attacker changes entries in a record.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Distributed Denial of Service (DDoS) attack?

An attack where a machine is sent more requests than it can handle.

An attack involving multiple computers sending requests, usually performed by a botnet.

An attack where an attacker gains unauthorized access to information.

An attack where the attacker deletes files which can impact computing capability.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Unauthorized Access allow an attacker to do?

Send more requests than a machine can handle.

Gain access to information they should not have.

Execute commands on a server.

Change entries in a record.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Executing Commands Illicitly?

An attack where a machine is sent more requests than it can handle.

An attack where an attacker gains unauthorized access to information.

An attack where an unknown or untrusted person executes commands on a server.

An attack where the attacker deletes files which can impact computing capability.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Data Diddling?

An attack where a machine is sent more requests than it can handle.

An attack where the attacker changes entries in a record.

An attack where an unknown or untrusted person executes commands on a server.

An attack where the attacker deletes files which can impact computing capability.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Data Destruction?

An attack where a machine is sent more requests than it can handle.

An attack where the attacker changes entries in a record.

An attack where an unknown or untrusted person executes commands on a server.

An attack where the attacker deletes files which can impact computing capability.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Social Engineering?

A non-technical or low technology confidence trick often involving trickery or fraud.

A technical method to gain unauthorized access to a system.

A method to execute commands on a server.

A method to change entries in a record.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers