[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

10th Grade

30 Qs

quiz-placeholder

Similar activities

Chapter 1: Amplify test: What is Energy?

Chapter 1: Amplify test: What is Energy?

6th Grade - University

25 Qs

Latihan IPS ASTS Ganjil

Latihan IPS ASTS Ganjil

12th Grade

28 Qs

Cybersecurity – Midterm Exam

Cybersecurity – Midterm Exam

12th Grade

31 Qs

Entrepreneurship Final Exam Review

Entrepreneurship Final Exam Review

12th Grade - University

25 Qs

Quarter 2 - Benchmark Review #3

Quarter 2 - Benchmark Review #3

9th - 12th Grade

25 Qs

Organelles Quiz

Organelles Quiz

9th - 12th Grade

25 Qs

Physics Exam Intro

Physics Exam Intro

9th - 12th Grade

25 Qs

(PART 1) REVIEW 2025 FINALS

(PART 1) REVIEW 2025 FINALS

11th Grade

25 Qs

[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

Assessment

Quiz

others

10th Grade

Easy

Created by

Bryce Trout

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social ______ is the concept of using relationships, persuasion, and body language to steal some otherwise secretive/personal information or persuade someone to perform some action.
construction
engineering
reconnaissance
distortion

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

3 Way Handshake Contains the following:
SYN
SYN/ACK
ACK
TROUT
BLT

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?
The activity of catching fish, either for food or as a sport
Probabilistic Hierarchy Identification System Hacking
An attempt to gain sensitive information through electronic communication
None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a sign of a phishing attack?
A certified letter
Misspelled words
Changes in font
Odd graphics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a phishing attempt directed at a specific target?
Spear phishing
Bulk phishing
Whaling
Clone phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Credential harvesting can be exploited via which type of cyberattack?
Phishing
Adversary-in-the-middle
DNS Poisoning
All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clicking on a hijacked link could lead to ______.
data being encrypted
MAC addresses being changed
malware getting installed
a Denial of Service attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?