Cyber Security Basics

Cyber Security Basics

University

42 Qs

quiz-placeholder

Similar activities

ITE 292 P3 Exam

ITE 292 P3 Exam

University

37 Qs

CPT EP Quiz 2 (C1 Computer Architecture, C10 Network Addresses)

CPT EP Quiz 2 (C1 Computer Architecture, C10 Network Addresses)

9th Grade - University

40 Qs

Revision Quiz

Revision Quiz

University

40 Qs

BIOS Settings Quiz

BIOS Settings Quiz

11th Grade - University

45 Qs

Latihan Soal Materi Informatika kelas 8 smt 1

Latihan Soal Materi Informatika kelas 8 smt 1

8th Grade - University

40 Qs

TOPIC 1: COMPUTER HARDWARE

TOPIC 1: COMPUTER HARDWARE

University

40 Qs

ASAT Teknologi Informasi & Komikasi Kelas 7

ASAT Teknologi Informasi & Komikasi Kelas 7

7th Grade - University

40 Qs

Integrated Application Software Prefinals

Integrated Application Software Prefinals

12th Grade - University

41 Qs

Cyber Security Basics

Cyber Security Basics

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Shashwot Shahi

Used 3+ times

FREE Resource

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the relationship between confidentiality, integrity, and availability in the CIA triad?

Confidentiality ensures data is accessible only to authorized users; integrity ensures data is unaltered; availability guarantees timely access to data.

Confidentiality ensures data is unaltered; integrity ensures data is accessible; availability guarantees data is encrypted.

Confidentiality guarantees timely access; integrity ensures data is encrypted; availability restricts access to authorized users.

Confidentiality and integrity both guarantee data availability.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of malware propagation, how does a worm differ from a virus in terms of its infection mechanism?

Worms require user interaction to spread, viruses spread autonomously.

Worms self-replicate and spread over networks without a host file, viruses attach to executable files and require user action.

Viruses spread through network vulnerabilities, worms attach to files.

Worms encrypt files, viruses delete files.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ransomware attack typically involves which of the following stages?

Data exfiltration, encryption, ransom demand, and decryption key delivery upon payment.

Immediate deletion of all user files.

Silent monitoring of user activity without file encryption.

Only stealing user credentials without file manipulation.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios best exemplifies a man-in-the-middle (MITM) attack?

An attacker intercepts and alters communication between a user and a bank website without either party's knowledge.

An attacker floods a server with traffic to cause denial of service.

An attacker sends phishing emails to steal credentials.

An attacker exploits a buffer overflow vulnerability to gain access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the implementation of HTTPS using SSL/TLS protocols protect against eavesdropping and tampering?

By encrypting data in transit and authenticating the server to the client.

By blocking all incoming traffic except from trusted IPs.

By scanning for malware at the network perimeter.

By storing passwords in encrypted form on the server.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the role of patch management in an organization's cybersecurity posture?

It ensures all software is updated regularly to mitigate known vulnerabilities and reduce attack surface.

It backs up data to prevent loss during attacks.

It monitors network traffic for suspicious activity.

It encrypts sensitive data at rest.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following social engineering techniques involves an attacker impersonating a trusted authority to extract information?

Phishing

Pretexting

Tailgating

Spear phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?