Cybersecurity Quiz

Cybersecurity Quiz

University

40 Qs

quiz-placeholder

Similar activities

Computers

Computers

KG - Professional Development

36 Qs

ADBMS CHAPTER 7: BIG DATA AND NOSQL

ADBMS CHAPTER 7: BIG DATA AND NOSQL

University

35 Qs

TQM - 1

TQM - 1

University

35 Qs

Economics Exam 3 Study Guide

Economics Exam 3 Study Guide

University

36 Qs

Dion Practice Test Most Missed Questions

Dion Practice Test Most Missed Questions

University

40 Qs

Final Exam 1st Semester

Final Exam 1st Semester

8th Grade - University

40 Qs

TCW Chapter 3 Part 1 Review Test

TCW Chapter 3 Part 1 Review Test

University

37 Qs

Attachment Theory Quiz

Attachment Theory Quiz

University

35 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Other

University

Easy

Created by

Jas115 F

Used 4+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A criminal organization has decided to leave their traditional ways and pursue cyberattacks as their new mode of operation. Why would they do this?

Easier to hide their tracks

Generate disruption

Less competition

Political beliefs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor does research, including Google searches, and discovers the cleaning establishment used by the company they want to target. The threat actor gets a job with the cleaning establishment for the sole purpose of obtaining any information that will help in their malicious efforts. What type of attack is the threat actor most likely to engage in?

Dumpster diving

Shoulder surfing

Cyber espionage

Google dorking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vaani, an IT administrator, discovers her company is using a modular router that will be in an EOL state within six months. Which of the following best describes what the company should do?

Replace the modules in the router with newer ones.

Upgrade the operating system to the latest version.

Update the firmware to patch known threats.

Replace the router with a new model.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A friend gets a virus and asks if you can help them fix the problem. You boot the computer with a bootable flash drive containing security-related tools and remove the virus. What type of control did you employ?

Deterrent

Corrective

Directive

Compensating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker hacks into a cell phone with the intent of stealing credit card information. The attacker also tries to extend the nefarious activity to contacts in the victim's phone, and their contacts as well. What entity was the attacker targeting?

An enterprise

A competitor

An individual

A government agency

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes what a nation-state actor is most likely to do if their attacks against a target are not successful?

Use different attack tools.

Hire more malicious actors.

Move on to a different target.

Continue trying until successful.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To bypass institutional overhead, a well-intentioned networking instructor purchases a wireless router and connects it to the network. The goal is to allow students to establish connectivity with each other by connecting through the wireless router. In what activity did the instructor participate?

APT

Shadow IT

Insider threat

Ethical hacking

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?