Cybersecurity 101

Cybersecurity 101

Professional Development

11 Qs

quiz-placeholder

Similar activities

QUIZ AULA DE ENCERRAMENTO

QUIZ AULA DE ENCERRAMENTO

Professional Development

10 Qs

Cybersecurity fun quiz

Cybersecurity fun quiz

Professional Development

11 Qs

Knowing the Cyber Threat

Knowing the Cyber Threat

Professional Development

6 Qs

POST-TEST DAY 3

POST-TEST DAY 3

Professional Development

10 Qs

CyberTest

CyberTest

Professional Development

12 Qs

IF30313 PTI - Course 1 QUIZ

IF30313 PTI - Course 1 QUIZ

Professional Development

10 Qs

Search Skills Quiz

Search Skills Quiz

Professional Development

15 Qs

Microsoft IT Pro Community Meetup - September

Microsoft IT Pro Community Meetup - September

Professional Development

10 Qs

Cybersecurity 101

Cybersecurity 101

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Jn Agu

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

practice of maintaining and following a set of regular habits and best practices to keep your digital environment secure, healthy, and free from Cyber Threats.

Cybersecurity

Data Security

Cyber Hygiene

Information Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

An attacker intercepts and alters communication between two parties.

Man-in-the-Middle Attack

Vishing

Denial of Service Attack

Impersonation

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

attacker sends a fake SMS message with a malicious link or phone number designed to steal personal data.

Phishing

Spear Phishing

Whaling

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Individuals with wide range of skills who are motivated by religious or political beliefs

Cyber Terrorists

Hacktivist

Hacker Teams

Industrial Spies

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Individuals who use their professed hacking skills for defensive purposes.

Hacktivist

Black Hat

Gray Hat

White Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Cyberattack technique that manipulates people into revealing confidential information, clicking on malicious links, or performing actions that compromise security. Instead of hacking systems directly, attackers exploit human psychology to bypass security controls.

Impersonation

Social Engineering

Baiting

Phishing Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

An attacker pretends to be someone else—like a colleague, boss, or authority figure—in order to manipulate others into performing actions, such as transferring funds or providing confidential information.

Pretexting

Impersonation

Baiting

Vishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?