
Intro to Cybersecurity - Review 2
Authored by Christopher Hickernell
Computers
Professional Development
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which is a DoS attack (select two)?
Ping Flood
Evil Twin
Phishing
Smurf Attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack is used to impersonate a router or other device so the attacker can intercept network communications?
ARP poisoning
Phishing
Ping Flood
Botnet attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command is used to check if a host is reachable?
nslookup
ping
dir
cd
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
sudo is a Linux command that is used to execute privileged functions?
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security Awareness Training is what type of security control?
Physical
Technical
Administrative
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of storage is an SSD used for?
Temporary
Permanent
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When an attacker is forced to brute-force a password, which characteristic is the most important?
Length
Complexity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?