CYBER HUNT 2K25 ROUND 1

CYBER HUNT 2K25 ROUND 1

University

25 Qs

quiz-placeholder

Similar activities

ICT Unit-2

ICT Unit-2

University

20 Qs

Quiz Harian Gdevelop MPK

Quiz Harian Gdevelop MPK

University

20 Qs

Algoritma Pemrograman

Algoritma Pemrograman

University

20 Qs

3D Objects - Terms & Transfomations

3D Objects - Terms & Transfomations

6th Grade - Professional Development

20 Qs

4-2 final QUIZ in ELEC4

4-2 final QUIZ in ELEC4

University

20 Qs

1.1.3 Input, output and storage

1.1.3 Input, output and storage

11th Grade - University

22 Qs

MODERN TECHNOLOGIES

MODERN TECHNOLOGIES

University

20 Qs

Digital and Analog transmission

Digital and Analog transmission

University

20 Qs

CYBER HUNT 2K25 ROUND 1

CYBER HUNT 2K25 ROUND 1

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Santhoshkumar M

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?

ip tracker

emails

websites

web pages

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?

Clickjacking

Buffer-overflow

Phishing

MiTM

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following term refers to a group of hackers who are both white and black hat?

Yellow Hat hackers

White-Black Hat Hackers

Grey Hat hackers

Red Hat Hackers

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of the following can be considered as the class of computer threats?

Dos Attack

Phishing

Soliciting

Both B and C

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Identify which of the following can be considered instances of Open design.

DVD Player

CSS

Only B

Both A and B

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is considered an element of cyber security?

Network security

Operational security

Application security

All of the above

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of attack involves sending fake emails to steal information?

Trojan Attack

Phishing

Spoofing

Worm

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?