XÓA

XÓA

University

50 Qs

quiz-placeholder

Similar activities

B - READING DAY 15-16

B - READING DAY 15-16

University

46 Qs

WORK

WORK

University

49 Qs

Soal Bahasa Inggris Semester II

Soal Bahasa Inggris Semester II

10th Grade - University

50 Qs

Test English Tân

Test English Tân

University

52 Qs

ANTI-CORUPTION WORK

ANTI-CORUPTION WORK

University

55 Qs

PRG3

PRG3

University

50 Qs

Midterm Exam in IT Elective 3

Midterm Exam in IT Elective 3

University

50 Qs

Revision Cyber Security

Revision Cyber Security

University

47 Qs

XÓA

XÓA

Assessment

Quiz

English

University

Hard

Created by

21070585 Anh

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?

Adware

Trojan

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat involves a hacker intercepting and altering messages between two parties to manipulate the conversation?

Man-in-the-middle

Phishing

SQL Injection

Spear-phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing passwords in plain text within a database is an example of a ___________

Misconfiguration vulnerability

Physical security vulnerability

Secure configuration

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends a large number of requests to a website, causing it to slow down and become inaccessible. This is an example of what attack?

DoS

Phishing

SQL Injection

Backdoor

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are common signs of a malware infection? (Choose two)

Slow system performance

Unexpected pop-up ads

Frequent updates

Short battery life

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company notices that an unknown user has been attempting to connect to their servers using brute-force methods. What type of threat is this?

Password attack

Insider threat

Malware

Zero-day exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rootkits are easy to detect with standard antivirus software

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?