Cybersecurity Knowledge Assessment

Cybersecurity Knowledge Assessment

University

25 Qs

quiz-placeholder

Similar activities

Redes I- Componentes y tipos de redes

Redes I- Componentes y tipos de redes

University

20 Qs

LINKEDLIST- DSA -2-3

LINKEDLIST- DSA -2-3

University

20 Qs

Midterm InfoTech2

Midterm InfoTech2

University

20 Qs

PRELIM-SW2

PRELIM-SW2

University

20 Qs

MS WORD- CHAPTER 11

MS WORD- CHAPTER 11

University

20 Qs

Java Control and Loop -2

Java Control and Loop -2

University

20 Qs

Logika & Pemrograman (ID)

Logika & Pemrograman (ID)

10th Grade - Professional Development

20 Qs

Briefing Besar PIM III

Briefing Besar PIM III

University

20 Qs

Cybersecurity Knowledge Assessment

Cybersecurity Knowledge Assessment

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

VedaSri Tutorials

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of User Access Control?

To simplify the user interface for easier navigation.

To restrict access to resources based on user permissions.

To enhance user productivity by providing more access.

To monitor user activity for security purposes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose incorrect statement (s):

A)The main types of Malware are viruses, worms, trojans, ransomware, spyware, adware, and rootkits. B) They can be prevented by using antivirus software, keeping systems updated, avoiding suspicious downloads, employing firewalls, and educating users.

c) NIDS is check inside the personal system for worms and also prevents them if found

A only

B only

C only

all are incorrect

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Read the following and find out the incorrect match of protocol and its use :

1) SSL/TLS : Encrypts data over the internet;

2) IPsec: Secures IP communications;

3) SSH: Provides secure remote access.

4) FTP : creates web pages

All are correct

All are incorrect

1,2&3 are Correct and 4 is incorrect

1,2 & 3 are incorrect and 4 is correct

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain Two-Factor Authentication and its importance.

Two-Factor Authentication only requires a password to access accounts. it is used only in stock markets not in other sectors

Two-Factor Authentication is primarily used for social media accounts. and it is used in public sector Factories

Two-Factor Authentication is a method to encrypt data during transmission.

Two-Factor Authentication enhances security by requiring two forms of verification, significantly reducing the risk of unauthorized access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify and describe three types of cyber attacks.

A)Phishing

B) Denial-of-Service (DoS)

C) Key-logging

D) Malware

E) Ransomware

A,C,E

A,B,E

B,C,D

A,D,E

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Budapest Convention and its significance in cyber-security?

Select Correct options :

A) The Budapest Convention is the first international treaty on cybercrime.

B) It promotes cooperation and legal standards for combating cybercrime.

C) it is an agreement for international trade in cybersecurity tools.

D) A national law specific to Hungary regarding internet usage.

A, B only

B,C only

C, D only

A,D only

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is there a need for a nodal agency for cyberspace management?

To focus solely on private sector cybersecurity initiatives.

To promote individual cybersecurity measures without coordination.

To ensure coordinated cybersecurity efforts and effective incident management.

To reduce the number of cybersecurity professionals needed.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?