Cybersecurity Attacks Quiz

Cybersecurity Attacks Quiz

University

19 Qs

quiz-placeholder

Similar activities

GDG ANDROID BOOTCAMP QUIZ

GDG ANDROID BOOTCAMP QUIZ

University

20 Qs

Quiz Kelas 7

Quiz Kelas 7

7th Grade - University

15 Qs

Windows File Sharing Quiz

Windows File Sharing Quiz

University

19 Qs

Web Browser

Web Browser

9th Grade - University

20 Qs

Mesin Pencari Artikel

Mesin Pencari Artikel

11th Grade - University

20 Qs

Dominando Google Sheets

Dominando Google Sheets

12th Grade - University

15 Qs

DATA STRUCTUIR Quiz1 (AIML)

DATA STRUCTUIR Quiz1 (AIML)

University

20 Qs

Proceso de innovación (seleccion de ideas)

Proceso de innovación (seleccion de ideas)

4th Grade - University

15 Qs

Cybersecurity Attacks Quiz

Cybersecurity Attacks Quiz

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Mark Feguro

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an attack in the context of cybersecurity?

An attempt to destroy or alter an asset

A method of securing data

A type of software

A network protocol

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What distinguishes an active attack from a passive attack?

Passive attacks are illegal; active attacks are legal

Active attacks modify data; passive attacks do not

Active attacks are less harmful than passive attacks

Active attacks are easier to detect than passive attacks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a Man-In-The-Middle (MITM) attack?

An attack where the attacker relays communication between two parties

An attack that uses brute force to guess passwords

An attack that involves social engineering

An attack that targets network hardware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a brute-force attack?

An attempt to guess passwords by trying many combinations

An attack that uses social engineering techniques

An attack that involves altering data

An attack that targets network infrastructure

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary goal of a Smurf attack?

To render computer networks inoperable

To steal sensitive information

To gain unauthorized access to a system

To modify data in transit

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What protocol does a Fraggle attack use?

HTTP

TCP

ICMP

UDP

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a dictionary attack?

An attack that targets network hardware

An attack that modifies data

An attack that uses social engineering

An attack that tries all dictionary words as passwords

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?