Cyber Security

Cyber Security

University

10 Qs

quiz-placeholder

Similar activities

Internet of Things

Internet of Things

University

10 Qs

IAS_F_SW1

IAS_F_SW1

University

10 Qs

DC&E Lesson 9 Quiz

DC&E Lesson 9 Quiz

6th Grade - University

12 Qs

Seminar Nasional Dies Natalis AAYKPN Ke-51 th

Seminar Nasional Dies Natalis AAYKPN Ke-51 th

University

10 Qs

PHYSICAL SECURITY MANAGEMENT

PHYSICAL SECURITY MANAGEMENT

University

15 Qs

230419_quizizz

230419_quizizz

University

15 Qs

GCT Zone

GCT Zone

University

12 Qs

Gus's Career Research Quiz

Gus's Career Research Quiz

KG - Professional Development

10 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Other

University

Hard

Created by

Developer UETT

Used 34+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cybersecurity also be referred to as ?

incident security

information technology security

internet security

threat security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cybersecurity encompass the full range of?

vulnerability reduction

incident response

recovery policies

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

Computer security

Cyber attack

Digital hacking

Cryptography

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of cyber security?

Cloud Security

All of these

Application Security

Network Security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?

emails

ip tracker

websites

web pages

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IT security in any firm or organization is maintained and handled by

Security Manager

Security Auditor

IT Security Engineer

Software Security Specialist

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the oldest phone hacking technique used by hackers to make free calls.

Spamming

Phreaking

Cracking

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?