
Cybersecurity Quiz

Quiz
•
Computers
•
12th Grade
•
Medium

Cynthia Stepp
Used 1+ times
FREE Resource
47 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Denial of Service (DoS) attack?
An attack where a machine is sent more requests than it can handle, blocking legitimate system access by reducing system availability.
An attack where an attacker gains unauthorized access to information.
An attack where an unknown person executes commands on a server.
An attack where the attacker changes entries in a record.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Distributed Denial of Service (DDoS) attack?
An attack where a machine is sent more requests than it can handle.
An attack involving multiple computers sending requests, usually performed by a botnet.
An attack where an attacker gains unauthorized access to information.
An attack where the attacker deletes files which can impact computing capability.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Unauthorized Access allow an attacker to do?
Send more requests than a machine can handle.
Gain access to information they should not have.
Execute commands on a server.
Change entries in a record.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Executing Commands Illicitly?
An attack where a machine is sent more requests than it can handle.
An attack where an attacker gains unauthorized access to information.
An attack where an unknown or untrusted person executes commands on a server.
An attack where the attacker deletes files which can impact computing capability.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Data Diddling?
An attack where a machine is sent more requests than it can handle.
An attack where the attacker changes entries in a record.
An attack where an unknown or untrusted person executes commands on a server.
An attack where the attacker deletes files which can impact computing capability.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Data Destruction?
An attack where a machine is sent more requests than it can handle.
An attack where the attacker changes entries in a record.
An attack where an unknown or untrusted person executes commands on a server.
An attack where the attacker deletes files which can impact computing capability.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Social Engineering?
A non-technical or low technology confidence trick often involving trickery or fraud.
A technical method to gain unauthorized access to a system.
A method to execute commands on a server.
A method to change entries in a record.
Create a free account and access millions of resources
Similar Resources on Wayground
44 questions
AP Cyber Security

Quiz
•
12th Grade
50 questions
AHJ: U6 Data Privacy and Security

Quiz
•
12th Grade - University
51 questions
Quiz tentang Teknologi VoIP

Quiz
•
12th Grade
48 questions
SH - Chapter 1

Quiz
•
9th - 12th Grade
48 questions
ESB Domain 1 Lesson 1

Quiz
•
10th - 12th Grade
44 questions
MICROSOFT OFFICE ICON

Quiz
•
KG - 12th Grade
45 questions
Final - Adobe Illustrator

Quiz
•
9th - 12th Grade
50 questions
Cybersecurity MS

Quiz
•
12th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade