[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

10th Grade

30 Qs

quiz-placeholder

Similar activities

Midterm Review 2- Internet Threat

Midterm Review 2- Internet Threat

10th Grade

30 Qs

Online Threats Quiz

Online Threats Quiz

12th Grade

31 Qs

PAT TEKNOLOGI PERKANTORAN 2023

PAT TEKNOLOGI PERKANTORAN 2023

10th Grade

33 Qs

Chemistry Test 2023

Chemistry Test 2023

8th Grade - University

30 Qs

US History CH10 Test- American Imperialism

US History CH10 Test- American Imperialism

10th Grade

27 Qs

Test 1: Treaty of Versailles Quiz

Test 1: Treaty of Versailles Quiz

10th Grade

25 Qs

Measurement & What is Science?

Measurement & What is Science?

7th Grade - University

25 Qs

Entrepreneurship Final Exam Review

Entrepreneurship Final Exam Review

12th Grade - University

25 Qs

[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

Assessment

Quiz

others

10th Grade

Easy

Created by

Bryce Trout

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social ______ is the concept of using relationships, persuasion, and body language to steal some otherwise secretive/personal information or persuade someone to perform some action.
construction
engineering
reconnaissance
distortion

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

3 Way Handshake Contains the following:
SYN
SYN/ACK
ACK
TROUT
BLT

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?
The activity of catching fish, either for food or as a sport
Probabilistic Hierarchy Identification System Hacking
An attempt to gain sensitive information through electronic communication
None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a sign of a phishing attack?
A certified letter
Misspelled words
Changes in font
Odd graphics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a phishing attempt directed at a specific target?
Spear phishing
Bulk phishing
Whaling
Clone phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Credential harvesting can be exploited via which type of cyberattack?
Phishing
Adversary-in-the-middle
DNS Poisoning
All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clicking on a hijacked link could lead to ______.
data being encrypted
MAC addresses being changed
malware getting installed
a Denial of Service attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?