Cybersecurity Concepts Worksheet

Cybersecurity Concepts Worksheet

University

55 Qs

quiz-placeholder

Similar activities

Switching, layering

Switching, layering

University

52 Qs

BSIT2102 PL Networking1 Tuando

BSIT2102 PL Networking1 Tuando

University

50 Qs

IAS1-FINAL EXAMINATION

IAS1-FINAL EXAMINATION

University

50 Qs

Information Security and Risk Management Quiz

Information Security and Risk Management Quiz

University

57 Qs

CISCO AIDANA

CISCO AIDANA

University

52 Qs

Midterm 1 - Database Security Quiz

Midterm 1 - Database Security Quiz

University

50 Qs

Кәсіби ағылшын 51 - 100

Кәсіби ағылшын 51 - 100

University

50 Qs

Кәсіби ағылшын 151 - 200

Кәсіби ағылшын 151 - 200

University

50 Qs

Cybersecurity Concepts Worksheet

Cybersecurity Concepts Worksheet

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

n b

Used 1+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of inappropriate use?

Accessing a sensitive file without authorization

Using a work computer to browse social media for hours

Crashing a server with traffic

Spreading malware via email

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an Unauthorized Access (UA) attack according to NIST?

A user accidentally deletes critical files

A hacker gains access to a system using stolen credentials

A website is overloaded with traffic

An employee forgets to log off a computer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Denial-of-Service (DoS) attack?

An attempt to access data without permission

The theft of personal credentials via email

An attack that floods a system with traffic, making it unavailable

A program that spreads itself by copying to other programs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a Trojan Horse?

A fake email asking for a password

A virus that replicates on its own

A seemingly legitimate program that has hidden malware

A worm that disables antivirus software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which option defines a virus?

A self-replicating program that does not require user interaction

A deceptive email designed to steal credentials

A malicious program attached to a host file that requires user action

A hoax message used to trick users into deleting files

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a hoax?

A fake pop-up claiming a virus is detected

A self-replicating program

A network scanning tool

An email phishing for passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common indicator of a DoS attack?

Unusual outbound email volume

Extremely slow network performance or service outages

Sudden increase in system logs

System clock changes unexpectedly

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?