CYBER HUNT 2K25 ROUND 1

CYBER HUNT 2K25 ROUND 1

University

25 Qs

quiz-placeholder

Similar activities

Cyber Security (Cyber security KS4 1-3)

Cyber Security (Cyber security KS4 1-3)

9th Grade - Professional Development

28 Qs

CCC32 - Chapter 9 - Future Skills and Cyber Security

CCC32 - Chapter 9 - Future Skills and Cyber Security

University

25 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Security+ Wireless Security Quiz

Security+ Wireless Security Quiz

University

20 Qs

Online Privacy

Online Privacy

University

20 Qs

IEEE Coding Cybersecurity

IEEE Coding Cybersecurity

University

27 Qs

IT Security Audit

IT Security Audit

University

30 Qs

CYBER HUNT 2K25 ROUND 1

CYBER HUNT 2K25 ROUND 1

Assessment

Quiz

Computers

University

Hard

Created by

Santhoshkumar M

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?

ip tracker

emails

websites

web pages

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?

Clickjacking

Buffer-overflow

Phishing

MiTM

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following term refers to a group of hackers who are both white and black hat?

Yellow Hat hackers

White-Black Hat Hackers

Grey Hat hackers

Red Hat Hackers

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of the following can be considered as the class of computer threats?

Dos Attack

Phishing

Soliciting

Both B and C

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Identify which of the following can be considered instances of Open design.

DVD Player

CSS

Only B

Both A and B

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is considered an element of cyber security?

Network security

Operational security

Application security

All of the above

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of attack involves sending fake emails to steal information?

Trojan Attack

Phishing

Spoofing

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?