CYBER CHALLENGES'24 QUIZ BATCH 2

CYBER CHALLENGES'24 QUIZ BATCH 2

University

20 Qs

quiz-placeholder

Similar activities

Incident Response and Security Quiz 3

Incident Response and Security Quiz 3

University

19 Qs

Decode the Tech Emoji

Decode the Tech Emoji

University

20 Qs

Network Topologies and Key Network Components

Network Topologies and Key Network Components

10th Grade - University

15 Qs

CLASS TEST Understanding Software and Apps

CLASS TEST Understanding Software and Apps

8th Grade - University

23 Qs

2.2 Data Transmission

2.2 Data Transmission

University

18 Qs

AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

University

20 Qs

Unit-1 Introduction to Cloud Computing

Unit-1 Introduction to Cloud Computing

University

20 Qs

Quiz 02-Finals-IT 222-FIAS

Quiz 02-Finals-IT 222-FIAS

University

18 Qs

CYBER CHALLENGES'24 QUIZ BATCH 2

CYBER CHALLENGES'24 QUIZ BATCH 2

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Santhoshkumar M

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Identify the security protocol which is not strong.

SMTP

SSL

SFTP

HTTPS

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Identify the class of computer threats.

Phishing

DOS attack

Soliciting

Both B and C

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Choose the default port number for Apache and other web servers.

20

27

80

87

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Why is response and transit time used?

To measure reliability

To measure security

To measure longevity

To measure performance

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are programmes or procedures that enable hackers to maintain control of a computer system ?

Exploits

Antivirus

Firewall by-passers

Worms

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

When the number of users surpasses the network’s capacity, which of the below network factors suffers the most?

Reliability

Performance

Security

Longevity

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In system hacking, which of the below is the most crucial activity ?

Information gathering

Covering tracks

Cracking passwords

None of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?