PRG2

PRG2

University

50 Qs

quiz-placeholder

Similar activities

Midterm Exam in IT Elective 3

Midterm Exam in IT Elective 3

University

50 Qs

Industrial security concept

Industrial security concept

University

52 Qs

vocab 3

vocab 3

University

50 Qs

AKT test (351-400)   Ескі вариант

AKT test (351-400) Ескі вариант

University

50 Qs

StartUp 2A (Entry Exam)

StartUp 2A (Entry Exam)

University

50 Qs

ĐỀ  AN TOÀN THÔNG TIN 1

ĐỀ AN TOÀN THÔNG TIN 1

University

50 Qs

PRG3

PRG3

University

50 Qs

Revision Cyber Security

Revision Cyber Security

University

47 Qs

PRG2

PRG2

Assessment

Quiz

English

University

Easy

Created by

21070585 Anh

Used 10+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?

Adware

Trojan

Spyware

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat involves a hacker intercepting and altering messages between two parties to manipulate the conversation?

Man-in-the-middle

Phishing

SQL Injection

Spear-phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing passwords in plain text within a database is an example of a ___________

Misconfiguration vulnerability

Physical security vulnerability

Secure configuration

Social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends a large number of requests to a website, causing it to slow down and become inaccessible. This is an example of what attack?

DoS

Phishing

SQL Injection

Backdoor

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are common signs of a malware infection? (Choose two)

Slow system performance

Unexpected pop-up ads

Frequent updates

Short battery life

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company notices that an unknown user has been attempting to connect to their servers using brute-force methods. What type of threat is this?

Password attack

Insider threat

Malware

Zero-day exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rootkits are easy to detect with standard antivirus software

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?