Cybersecurity 101

Cybersecurity 101

Professional Development

11 Qs

quiz-placeholder

Similar activities

Hactober Cyber Circuit

Hactober Cyber Circuit

Professional Development

10 Qs

Mitre Att&ck Quiz

Mitre Att&ck Quiz

Professional Development

15 Qs

How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Professional Development

10 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Användning av AI för detektering och respons på säkerhetsinciden

Användning av AI för detektering och respons på säkerhetsinciden

Professional Development

10 Qs

cyber Security Awareness

cyber Security Awareness

Professional Development

15 Qs

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

Cybersecurity 101

Cybersecurity 101

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Jn Agu

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

practice of maintaining and following a set of regular habits and best practices to keep your digital environment secure, healthy, and free from Cyber Threats.

Cybersecurity

Data Security

Cyber Hygiene

Information Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

An attacker intercepts and alters communication between two parties.

Man-in-the-Middle Attack

Vishing

Denial of Service Attack

Impersonation

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

attacker sends a fake SMS message with a malicious link or phone number designed to steal personal data.

Phishing

Spear Phishing

Whaling

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Individuals with wide range of skills who are motivated by religious or political beliefs

Cyber Terrorists

Hacktivist

Hacker Teams

Industrial Spies

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Individuals who use their professed hacking skills for defensive purposes.

Hacktivist

Black Hat

Gray Hat

White Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Cyberattack technique that manipulates people into revealing confidential information, clicking on malicious links, or performing actions that compromise security. Instead of hacking systems directly, attackers exploit human psychology to bypass security controls.

Impersonation

Social Engineering

Baiting

Phishing Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

An attacker pretends to be someone else—like a colleague, boss, or authority figure—in order to manipulate others into performing actions, such as transferring funds or providing confidential information.

Pretexting

Impersonation

Baiting

Vishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?