Cyber Security Essentials 4th August 2025

Cyber Security Essentials 4th August 2025

University

10 Qs

quiz-placeholder

Similar activities

Group 2 - ICT

Group 2 - ICT

University

10 Qs

good quiz

good quiz

KG - Professional Development

6 Qs

DoS Attack Quiz

DoS Attack Quiz

University

10 Qs

QUIZ #1

QUIZ #1

University

10 Qs

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

University

10 Qs

Cyber Security Threats/Attacks Quiz

Cyber Security Threats/Attacks Quiz

University

10 Qs

Chapter 1: Introduction to Cyber Security

Chapter 1: Introduction to Cyber Security

University

15 Qs

Cybersecurty Concepts

Cybersecurty Concepts

University

10 Qs

Cyber Security Essentials 4th August 2025

Cyber Security Essentials 4th August 2025

Assessment

Quiz

Computers

University

Medium

Created by

Udhayakumar Shanmugam

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DDoS

is a malicious cyberattack where multiple compromised computer systems, often forming a botnet, flood a targeted server, service, or network with a massive amount of traffic.

a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed

is a type of malicious cyber attack where an attacker tricks a user into performing actions on a website that they are already authenticated on, without the user's knowledge or consent.

is a cyberattack that exploits vulnerabilities in Application Programming Interfaces (APIs) to achieve malicious objectives.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DNS query flood denial of service attacks mainly .....................................sector, that accounts for more than 40% of all sectors

Financial

Healthcare

Telecom

Social media

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..................................................... are groups of criminals who unite to carry out cyber attacks in support of political causes. They typically target entire industries but sometimes attack specific organizations who they feel don't align with their political views or practices.

Ethical Hackers

Hacktivists

Activist

Cyber Ciriminals

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In 2024, ...............................acted as a primary coordination and communication hub for

hacktivist groups, largely due to its anonymity features and lenient moderation.

Twitter

Facebook

Telegram

Signal

Whatsapp

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The surge in AI technologies gave rise to sophisticated ................. bots, which

aggressively scrape data to train AI models—often without explicit permission

“grey”

"bad"

“black”

“White”

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.............................videos are media, typically videos, that are digitally manipulated or created using artificial intelligence to make it appear as if someone is doing or saying something they never did. These videos are often highly realistic, making them difficult to distinguish from genuine footage, and can be used to spread misinformation, create false narratives, or even impersonate individuals.

Proxy

Fake

Deepfake

Morphed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An API, which stands for ..........................................................................., is a set of rules and protocols that allows different software applications to communicate and interact with each other.

Application Programming Interface

Application Programming Interchange

Application Process Interface

Android Programming Interface

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?