Cyber Law & Ethics Quiz(Section 2.2)

Cyber Law & Ethics Quiz(Section 2.2)

University

15 Qs

quiz-placeholder

Similar activities

Certified Ethical Hacker 2

Certified Ethical Hacker 2

University

10 Qs

INTRODUCTION OF AVIATION SECURITY

INTRODUCTION OF AVIATION SECURITY

University

10 Qs

The United Nations

The United Nations

University

10 Qs

Certified Ethical Hacker 4

Certified Ethical Hacker 4

University

10 Qs

Fundamental of Networking 20200216

Fundamental of Networking 20200216

University

11 Qs

TIK

TIK

University

10 Qs

Cybersecurity Basics Quiz

Cybersecurity Basics Quiz

6th Grade - University

15 Qs

Cybercrime

Cybercrime

University

10 Qs

Cyber Law & Ethics Quiz(Section 2.2)

Cyber Law & Ethics Quiz(Section 2.2)

Assessment

Quiz

Other

University

Medium

Created by

Dr. Singh

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does malware refer to?

Malicious software designed to harm systems

A type of firewall

A secure coding practice

A method of data encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware encrypts files and demands a ransom?

Virus

Worm

Ransomware

Trojan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Denial of Service (DoS) attack primarily aimed at?

Gaining unauthorized access

Installing malware

Disrupting service availability

Stealing data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack method floods a target with excessive traffic?

Session Hijacking

Volume-based Attack

Protocol Attack

Application Layer Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a Distributed Denial of Service (DDoS) attack?

To gain unauthorized access

To disrupt services using multiple devices

To steal sensitive information

To install spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to mitigate DoS attacks?

Using strong passwords

User education

Regularly updating software

Implementing DDoS protection services

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SQL Injection exploit?

User passwords

Malicious email attachments

Weaknesses in web applications

Network vulnerabilities

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?