
AEGIS Cyber Quiz
Authored by Aegis SRM_IST
Information Technology (IT)
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the term for a cyber attack where users are tricked into revealing personal information via fake emails?
DDoS
Brute-force
Phishing
Spoofing
2.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
The CIA triad's three core principles are...?
Control, Integrity, Authentication
Confidentiality, Integrity, Availability
Cybersecurity, Information, Access
Confidentiality, Investigation, Auditing
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What process verifies the identity of a user or system?
Authorization
Encryption
Authentication
Auditing
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An attack that tries many password combinations is called a...?
DDoS attack
Phishing attack
Brute-force attack
Man-in-the-middle attack
5.
MULTIPLE CHOICE QUESTION
45 sec • 10 pts
What is a 'sandbox' in cybersecurity?
A tool for analyzing network traffic
A safe environment to run and observe suspicious code
A knowledge base of adversary tactics
A system for managing digital certificates
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What type of malware locks your files and demands a payment to unlock them?
Spyware
Virus
Worm
Ransomware
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What kind of attack floods a system with traffic to exhaust its resources?
SQL Injection
Man-in-the-Middle
DDoS
Zero-day
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?