Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

quiz-placeholder

Similar activities

DWDM Unit1 Quiz

DWDM Unit1 Quiz

University

21 Qs

COA_QUIZ_UNIT I

COA_QUIZ_UNIT I

University

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Algo Quiz

Algo Quiz

University

16 Qs

Quiz on Misinformation and Bias

Quiz on Misinformation and Bias

10th Grade - University

18 Qs

ระบบปฏิบัติการ ชุดที่ 1

ระบบปฏิบัติการ ชุดที่ 1

University

15 Qs

Round 2 for Preplacement Bootcamp

Round 2 for Preplacement Bootcamp

University

15 Qs

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Nayan R

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to secure a password?

Storing it in a text file

Sharing it with friends

Using two-factor authentication

Writing it on a sticky note

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of cyber attack does the attacker compromise a network by exploiting the relationship between two devices in communication to intercept and alter the data?

Denial of Service (DoS)

Man-in-the-Middle (MitM)

Cross-Site Scripting (XSS)

Brute Force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym VPN stand for?

Virtual Private Network

Virtual Public Network

Very Private Network

Virtual Protected Network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common form of malware?

Phishing

Firewall

Antivirus

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall in a computer network?

To physically block unwanted cables

To prevent unauthorized access to or from a network

To store data securely

To increase internet speed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber attack involves tricking users into divulging sensitive information?

Phishing

Ransomware

DoS attack

SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is primarily used for securely transmitting data over the Internet?

HTTP

HTTPS

FTP

SMTP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?