AEGIS Cyber Quiz

AEGIS Cyber Quiz

University

15 Qs

quiz-placeholder

Similar activities

Week 1 IS-IA Quiz 1

Week 1 IS-IA Quiz 1

University

10 Qs

QUIZ-group5

QUIZ-group5

University

10 Qs

YBAA

YBAA

University

10 Qs

Cloud Computing and web services Practice Quizes

Cloud Computing and web services Practice Quizes

University

10 Qs

Ethical Hacking week #1

Ethical Hacking week #1

University

10 Qs

Cryptography and Network Security Quiz

Cryptography and Network Security Quiz

University

19 Qs

บทที่ 3 เครือข่ายคอมพิวเตอร์และอินเทอร์เน็ตในโรงแรม

บทที่ 3 เครือข่ายคอมพิวเตอร์และอินเทอร์เน็ตในโรงแรม

University

20 Qs

TcP252_k32_FQ1

TcP252_k32_FQ1

University

12 Qs

AEGIS Cyber Quiz

AEGIS Cyber Quiz

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Aegis SRM_IST

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the term for a cyber attack where users are tricked into revealing personal information via fake emails?

DDoS

Brute-force

Phishing

Spoofing

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

The CIA triad's three core principles are...?

Control, Integrity, Authentication

Confidentiality, Integrity, Availability

Cybersecurity, Information, Access

Confidentiality, Investigation, Auditing

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What process verifies the identity of a user or system?

Authorization

Encryption

Authentication

Auditing

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An attack that tries many password combinations is called a...?

DDoS attack

Phishing attack

Brute-force attack

Man-in-the-middle attack

5.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

What is a 'sandbox' in cybersecurity?

A tool for analyzing network traffic

A safe environment to run and observe suspicious code

A knowledge base of adversary tactics

A system for managing digital certificates

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of malware locks your files and demands a payment to unlock them?

Spyware

Virus

Worm

Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What kind of attack floods a system with traffic to exhaust its resources?

SQL Injection

Man-in-the-Middle

DDoS

Zero-day

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?