Quiz #2 Mitigating Security Threats for Organizational Assets

Quiz #2 Mitigating Security Threats for Organizational Assets

University

26 Qs

quiz-placeholder

Similar activities

Cyber Security Incident Overview Quiz

Cyber Security Incident Overview Quiz

University

24 Qs

HAWKIN'S HUNT ROUND -1 QUIZ

HAWKIN'S HUNT ROUND -1 QUIZ

University

30 Qs

Form 3 - Information Technology Quiz

Form 3 - Information Technology Quiz

9th Grade - University

21 Qs

Blockly Games

Blockly Games

8th Grade - University

23 Qs

Repaso Tema 1

Repaso Tema 1

1st Grade - University

21 Qs

Cuestionario sobre Virtualización de Red

Cuestionario sobre Virtualización de Red

University

21 Qs

IT ERA MIDTERM EXAM MCQ (2024-25)

IT ERA MIDTERM EXAM MCQ (2024-25)

University

30 Qs

Soal Keamanan Jaringan

Soal Keamanan Jaringan

12th Grade - University

31 Qs

Quiz #2 Mitigating Security Threats for Organizational Assets

Quiz #2 Mitigating Security Threats for Organizational Assets

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

June Mercene

Used 4+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An individual successfully breaks into SecureTech’s financial database to steal client records. This person is considered a:

Cracker

Black Hat Hacker

Grey Hat Hacker

White Hat Hacker

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An unusual increase in network traffic at SecureTech needs investigation. Which tool is best suited for this task?

Vulnerability Scanning Tools

Firewall

Protocol Analyzer

Port Scanner

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Attackers overwhelm a company’s servers with repeated requests, making them unavailable to legitimate users. This scenario best describes a:

IP Spoofing

Spam Flood

DoS Attack

Trojan Horse

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A are false warnings or fake information spread online to trick people into believing something that isn’t true.

Hoaxes

Adware

Phishing

Social Engineering

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A program that captures a user’s input without their knowledge and transmits it to a third party.

Rootkit

Keylogger

Backdoor

Spyware

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Employees receive a message claiming to be from their company’s IT support, asking for login credentials.

Spear Phising

Pharming

Phreaking

Social Engineering

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker intercepts messages between a user and a server, altering the communication without detection.

Replay Attack

Hijacking

Man-in-the-Middle-Attack

Spoofing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?