Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

quiz-placeholder

Similar activities

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Knowing Yourself & Enemy

Knowing Yourself & Enemy

University

19 Qs

J277 - 1.4 - Network Threats

J277 - 1.4 - Network Threats

10th Grade - University

16 Qs

3A-DDC313-SW5

3A-DDC313-SW5

University

20 Qs

Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

Intruders Attacks on Network and Computers

Intruders Attacks on Network and Computers

University

15 Qs

Cybersecurity Threats and Prevention Quiz

Cybersecurity Threats and Prevention Quiz

9th Grade - University

20 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Nayan R

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to secure a password?

Storing it in a text file

Sharing it with friends

Using two-factor authentication

Writing it on a sticky note

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of cyber attack does the attacker compromise a network by exploiting the relationship between two devices in communication to intercept and alter the data?

Denial of Service (DoS)

Man-in-the-Middle (MitM)

Cross-Site Scripting (XSS)

Brute Force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym VPN stand for?

Virtual Private Network

Virtual Public Network

Very Private Network

Virtual Protected Network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common form of malware?

Phishing

Firewall

Antivirus

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall in a computer network?

To physically block unwanted cables

To prevent unauthorized access to or from a network

To store data securely

To increase internet speed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber attack involves tricking users into divulging sensitive information?

Phishing

Ransomware

DoS attack

SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is primarily used for securely transmitting data over the Internet?

HTTP

HTTPS

FTP

SMTP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?