Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

University

9 Qs

quiz-placeholder

Similar activities

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

Recording Software Button Identification Quiz

Recording Software Button Identification Quiz

8th Grade - University

10 Qs

Internet

Internet

University

11 Qs

HTML

HTML

University

13 Qs

ICF-Mechanical-(Theory Quiz-2)

ICF-Mechanical-(Theory Quiz-2)

University

10 Qs

BOOLEAN CLUB QUIZ 1

BOOLEAN CLUB QUIZ 1

University

10 Qs

Concept of Computer Network

Concept of Computer Network

University

10 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Vasaka Visoottiviseth

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lucas successfully hacked to a company via a security vulnerability on their website. He did not damage or steal the data but just leave a message to the admin to fix the website bug.
Lucas is considered as what type of hacker?

Black Hat

White Hat

Grey Hat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is NOT in the AAA model?

Access Control

Authentication

Authorization

Accounting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The AAA model is used to ensure which principles of security?

C

I

A

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which process keeps track of what users do, including what they access?

Encryption

Authentication

Authorization

Accounting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you enter the hotel room by using the access card, this one is considered as authentication by using which of the below?

What You Know

What You Have

What You Are

What You Feel

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The One-Time-Password (OTP) you got via an SMS is considered as authentication by which one?

What You Know

What You Have

What You Are

What You See

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication by using both the password and an access card is considered as Multi-factor Authentication (MFA) ?

TRUE

FALSE

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Backup is used to protect which principles of security?

C

I

A

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hashing is used to protect which principles of security?

C

I

A