Cyber mid2

Cyber mid2

University

50 Qs

quiz-placeholder

Similar activities

ITE 383: Network Security P2 EXAM

ITE 383: Network Security P2 EXAM

University

50 Qs

AKT test (151-200)   Жаңа вариант

AKT test (151-200) Жаңа вариант

University

50 Qs

IT Networking Certification

IT Networking Certification

11th Grade - University

45 Qs

Their Networking Certification

Their Networking Certification

11th Grade - University

45 Qs

Network Plus

Network Plus

11th Grade - University

45 Qs

NetAcad Quiz Questions

NetAcad Quiz Questions

11th Grade - University

48 Qs

CSC 308 ISA MIDTERM EXAM

CSC 308 ISA MIDTERM EXAM

University

45 Qs

Quiz3 CBT202

Quiz3 CBT202

University

50 Qs

Cyber mid2

Cyber mid2

Assessment

Quiz

Computers

University

Medium

Created by

Динара Альменбетова

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the purpose of encryption keys?

  • Increase server bandwidth

  • Enable access to encrypted data

  • Speed up database queries

  • Enhance data compression

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which protocol is vulnerable to DNS reflection attacks?

  • FTP

  • UDP

  • TCP

  • SMTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is an HTTPS flood?

  • A malware injection

  • An attack on encrypted traffic

  • An advanced VPN attack

  • A method of encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which attack exploits vulnerabilities in SQL databases?

  • Phishing attack

  • SQL injection

  • DDoS attack

  • Keylogger attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the goal of multi-factor authentication (MFA)?

  • Require multiple forms of verification

  • Monitor unauthorized devices

  • Disable encryption protocols

  • Automate login processes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is a WPA3 improvement over WPA2?

  • Lower battery usage

  • Easier password recovery

  • Better network bandwidth

  • Enhanced encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the purpose of a vulnerability scanner?

  • a) Disable unauthorized devices

  • b) Monitor network speed

  • c) Encrypt all user data

  • d) Identify potential security weaknesses

  • Disable unauthorized devices

  • Monitor network speed

  • Encrypt all user data

  • Identify potential security weaknesses

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?